61] loop5: partition table beyond EOD, truncated [ 1191.301221] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x20000004, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 23:20:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000005c0)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 23:20:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f00000000000000000005000000", 0x20, 0x1c0}]) 23:20:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd6, &(0x7f0000000140)=""/214, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:20:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000005c0)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 1191.639865] Dev loop5: unable to read RDB block 1 [ 1191.645123] loop5: unable to read partition table [ 1191.668846] loop5: partition table beyond EOD, truncated [ 1191.682698] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x0, 0x0) futex(&(0x7f0000000040)=0x1, 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000005c0)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 23:20:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040), 0x10) 23:20:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f00000000000000000005000000", 0x20, 0x1c0}]) 23:20:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) 23:20:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000500)={0x14, r1, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 23:20:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000005c0)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 1192.265043] Dev loop5: unable to read RDB block 1 [ 1192.277921] loop5: unable to read partition table [ 1192.302238] loop5: partition table beyond EOD, truncated 23:20:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) [ 1192.341089] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x3c8, 0x268, 0x11, 0x148, 0x268, 0x0, 0x330, 0x2a8, 0x2a8, 0x330, 0x2a8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68], 0x0, 0x208, 0x268, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'netpci0\x00', {0x0, 0x0, 0x0, 0x0, 0x3000000, 0x3ff, 0x8}}}, @common=@set={{0x40, 'set\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@dev, @local, 0x0, 0x0, 'dummy0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@dccp={{0x30, 'dccp\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) 23:20:39 executing program 3: recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x1c) sendto$inet6(r0, &(0x7f00000000c0)="ea31cc33828380e54877dad011201b7ebfc7a7261af43198e655ef82ec432825864a89c2c1ff2bb32114a002f2def316f7864d91b63cdd1404dc5093c994972e25dc38c52ba3967d1643b8ccdd937a4c06de0e234317862d338e54519fe0fc52aa8e4e0180608429165d6f419c4ad724ae120a30cb4f7dbd43b17752b394ea2218399566f5711e4fceb64e674a25747fb4dd2584cb0fb1335d44a457f17e12d75330", 0xa2, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x80000002, @mcast2}, 0x1c) unshare(0x40000000) r1 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x51e3485c}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f00000004c0)={0x8, 'veth1\x00', {'gretap0\x00'}, 0xfeff}) r3 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) bind(0xffffffffffffffff, &(0x7f0000000500)=@nfc_llcp={0x27, 0x0, 0x0, 0x6, 0x9, 0x20, "77a99b603c70087bee2043cb055ec806dce3d5b9b941d61ebbfb93f701ceb9a69e16554b6d0f0b5e0340e826b65779e4311e86f3db62e7d1ac39459d6e16ba", 0x31}, 0x80) connect$inet(r3, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff02000000000000", 0x1e5) socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)=@security={'security\x00', 0xe, 0x4, 0x398, 0xffffffff, 0x2c0, 0x2c0, 0x2c0, 0xffffffff, 0xffffffff, 0x4f8, 0x4f8, 0x4f8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@loopback, @rand_addr=' \x01\x00', [], [], 'veth1\x00', 'macvlan1\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private2, 'netpci0\x00'}}}, {{@ipv6={@private0, @mcast1, [], [], 'veth1\x00', 'veth0_to_team\x00'}, 0x0, 0xa8, 0xc7}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 23:20:39 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) 23:20:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200"/48, 0x30, 0x1c0}]) [ 1192.521182] xt_hashlimit: max too large, truncated to 1048576 [ 1192.549955] xt_hashlimit: overflow, try lower: 0/0 [ 1192.601301] IPVS: ftp: loaded support on port[0] = 21 [ 1192.636650] Dev loop5: unable to read RDB block 1 [ 1192.659768] loop5: unable to read partition table [ 1192.687294] loop5: partition table beyond EOD, truncated [ 1192.725628] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1192.861004] IPVS: ftp: loaded support on port[0] = 21 23:20:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x0, 0x0) futex(&(0x7f0000000040)=0x1, 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:40 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000001080), 0x8) 23:20:40 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 23:20:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200"/48, 0x30, 0x1c0}]) 23:20:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, r1, 0xc9616e7406a3069b, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 23:20:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, r1, 0xc9616e7406a3069b, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x50}}, 0x0) [ 1193.182983] Dev loop5: unable to read RDB block 1 [ 1193.195218] loop5: unable to read partition table [ 1193.214735] loop5: partition table beyond EOD, truncated 23:20:40 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000bc0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 23:20:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) [ 1193.237297] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, r1, 0xc9616e7406a3069b, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 23:20:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200"/48, 0x30, 0x1c0}]) 23:20:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='GPL\x00', 0x0, 0xda, &(0x7f0000000400)=""/218, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:20:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00', 0xffffffffffffffff) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x14, r1, 0x301, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 1193.460898] Dev loop5: unable to read RDB block 1 [ 1193.470681] loop5: unable to read partition table [ 1193.490744] loop5: partition table beyond EOD, truncated [ 1193.518609] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(0x0, 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x50, r1, 0xc9616e7406a3069b, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 23:20:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000001380)={'macvtap0\x00', @ifru_addrs=@xdp}) 23:20:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200"/56, 0x38, 0x1c0}]) [ 1194.125860] device veth0_macvtap left promiscuous mode 23:20:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(0x0, 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:41 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000e00)={0x0, 0x0, 0x0}, 0x0) [ 1194.151101] Dev loop5: unable to read RDB block 1 [ 1194.156072] loop5: unable to read partition table [ 1194.181870] loop5: partition table beyond EOD, truncated [ 1194.213068] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200"/56, 0x38, 0x1c0}]) 23:20:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x14}, 0x40) 23:20:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(0x0, 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:41 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) [ 1194.531666] Dev loop5: unable to read RDB block 1 23:20:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) [ 1194.553443] loop5: unable to read partition table 23:20:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x24}}, 0x0) [ 1194.599836] loop5: partition table beyond EOD, truncated 23:20:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1d}, 0x40) [ 1194.646465] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:41 executing program 3: bpf$BPF_BTF_LOAD(0x14, &(0x7f00000000c0)={0x0, &(0x7f00000005c0)=""/4096, 0x0, 0x1000}, 0x20) 23:20:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r2, @ANYBLOB="0480"], 0x1ec}}, 0x0) 23:20:41 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg$sock(r0, &(0x7f0000004680)=[{{&(0x7f0000000000)=@xdp, 0x80, 0x0}}], 0x1, 0x0) [ 1195.133611] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.1'. 23:20:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200"/56, 0x38, 0x1c0}]) 23:20:42 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000080)=0xc00) 23:20:42 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 1195.215782] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.1'. 23:20:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 1195.288449] Dev loop5: unable to read RDB block 1 [ 1195.293382] loop5: unable to read partition table [ 1195.326291] loop5: partition table beyond EOD, truncated [ 1195.351900] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:20:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x12) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) syz_emit_ethernet(0x37, &(0x7f00000001c0)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}, {'\"'}}}}}}, 0x0) accept(r0, 0x0, 0x0) 23:20:42 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/245, 0x29, 0xf5, 0x1}, 0x20) 23:20:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200"/60, 0x3c, 0x1c0}]) 23:20:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000015c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 23:20:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0xaa4}, 0x40) 23:20:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000010) [ 1195.668507] Dev loop5: unable to read RDB block 1 [ 1195.673640] loop5: unable to read partition table [ 1195.694228] loop5: partition table beyond EOD, truncated [ 1195.715026] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x8}}, &(0x7f00000005c0)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 23:20:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @l2tp={0x2, 0x0, @local}, @phonet, @vsock={0x28, 0x0, 0x0, @hyper}, 0xfff7, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)='ipvlan0\x00', 0x5, 0x7f, 0x2}) 23:20:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200"/60, 0x3c, 0x1c0}]) 23:20:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xa}}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd6, &(0x7f0000000140)=""/214, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:20:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0xaa4, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) [ 1195.992040] Dev loop5: unable to read RDB block 1 [ 1196.001225] loop5: unable to read partition table [ 1196.029755] loop5: partition table beyond EOD, truncated [ 1196.068538] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, 0x0}, 0x160) 23:20:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:43 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={0x0}}, 0x0) 23:20:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x1, &(0x7f00000002c0)=@raw=[@func], &(0x7f0000000300)='syzkaller\x00', 0x3, 0xe3, &(0x7f0000000340)=""/227, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:20:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200"/60, 0x3c, 0x1c0}]) 23:20:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r2, @ANYBLOB="04"], 0x1ec}}, 0x0) 23:20:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x20, r1, 0x301, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x2}]}]}, 0x20}}, 0x0) [ 1196.571798] Dev loop5: unable to read RDB block 1 [ 1196.587376] loop5: unable to read partition table 23:20:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4040) [ 1196.617384] loop5: partition table beyond EOD, truncated [ 1196.637075] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1196.656282] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1196.717826] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.3'. 23:20:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x894b, &(0x7f0000001380)={'macvtap0\x00', @ifru_addrs=@xdp}) 23:20:43 executing program 2: pipe(&(0x7f0000001ac0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x10, 0x2, 0x0) r3 = socket$inet(0x2, 0x3, 0xff) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYRES64], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000500)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="24001b000000834780dba56a4690000000000000", @ANYRES32=r4], 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="310400002e"], 0x2}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x84ffe2, 0x0) 23:20:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB='Z'], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 23:20:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f00000000000000000005000000000042000000000000000000000000000000000000000000000000002000", 0x3e, 0x1c0}]) 23:20:43 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x1, 0x0, &(0x7f0000000040)) [ 1196.952808] netlink: 1037 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.978426] Dev loop5: unable to read RDB block 1 [ 1196.983596] loop5: unable to read partition table [ 1197.011965] loop5: partition table beyond EOD, truncated [ 1197.044403] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1197.053730] Dev loop5: unable to read RDB block 1 [ 1197.069582] loop5: unable to read partition table [ 1197.092766] loop5: partition table beyond EOD, truncated 23:20:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x12, 0x3ff, 0x0, 0x800}, 0x40) 23:20:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x8}]}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd6, &(0x7f0000000140)=""/214, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:20:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f00000000000000000005000000000042000000000000000000000000000000000000000000000000002000", 0x3e, 0x1c0}]) 23:20:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd6, &(0x7f0000000140)=""/214, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:20:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x0, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f00000005c0)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 1197.458700] Dev loop5: unable to read RDB block 1 [ 1197.466498] loop5: unable to read partition table [ 1197.495827] loop5: partition table beyond EOD, truncated 23:20:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x3}]}]}}, &(0x7f00000005c0)=""/4096, 0x36, 0x1000, 0x1}, 0x20) [ 1197.546221] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:44 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pread64(r0, 0x0, 0x0, 0x0) [ 1197.732957] netlink: 1037 bytes leftover after parsing attributes in process `syz-executor.2'. 23:20:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}]}}, &(0x7f00000005c0)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 23:20:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f00000000000000000005000000000042000000000000000000000000000000000000000000000000002000", 0x3e, 0x1c0}]) 23:20:44 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local, @remote, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @local, "", @link_local, "07228fc8c90c0183"}}}}, 0x0) 23:20:44 executing program 3: pipe(&(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 1197.928894] Dev loop5: unable to read RDB block 1 [ 1197.940650] loop5: unable to read partition table [ 1197.978699] loop5: partition table beyond EOD, truncated [ 1198.017923] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, @qipcrtr, @rc={0x1f, @none}, 0x3ff, 0x0, 0x0, 0x0, 0x8}) 23:20:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x9, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:20:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_map}) 23:20:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055", 0x3f, 0x1c0}]) 23:20:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 23:20:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @dev}, @qipcrtr, @rc={0x1f, @none}}) 23:20:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000002180)={0x0, 0x0, 0x0}, 0x101) [ 1198.448868] Dev loop5: unable to read RDB block 1 [ 1198.466835] loop5: unable to read partition table 23:20:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x40) [ 1198.493163] loop5: partition table beyond EOD, truncated [ 1198.546215] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'syztnl0\x00', 0x0}) 23:20:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x29, 0x6}]}}, &(0x7f0000000100)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 23:20:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000c1ed400000000001ea2603cb19cbab67ae1400002e019d8c3d5e126926a001715c3b01438425beacd3267df8231b663c1cc4eca8850dcc4bbc043130b3c00e5d85fde9d7fb720938502e9b11d24fe1217920e94376"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) 23:20:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) 23:20:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055", 0x3f, 0x1c0}]) 23:20:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x29, 0x6}]}}, &(0x7f0000000100)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 23:20:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:20:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x18, r1, 0x301, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKINFO_HEADER={0x4}]}, 0x18}}, 0x0) [ 1198.843369] Dev loop5: unable to read RDB block 1 [ 1198.861425] loop5: unable to read partition table 23:20:45 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000000)) [ 1198.916098] loop5: partition table beyond EOD, truncated 23:20:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x29, 0x6}]}}, &(0x7f0000000100)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 1198.958031] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="dd"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001740)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xc}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x4}}]}, 0x30}}, 0x0) 23:20:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055", 0x3f, 0x1c0}]) 23:20:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x0, 0x0, 0x2}}, &(0x7f00000005c0)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 23:20:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x29, 0x6}]}}, &(0x7f0000000100)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 23:20:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14, 0x0, 0x1, 0x503}, 0x14}}, 0x0) 23:20:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x40) [ 1199.274752] Dev loop5: unable to read RDB block 1 [ 1199.287283] loop5: unable to read partition table [ 1199.318526] loop5: partition table beyond EOD, truncated 23:20:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x18, r1, 0x1, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKINFO_HEADER={0x4}]}, 0x18}}, 0x0) [ 1199.362675] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:20:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00', 0xffffffffffffffff) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000016c0)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x34, r1, 0x301, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 23:20:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:20:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000002a0000003500000020f7ff00850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c}}]}, 0x78}}, 0x0) 23:20:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40}]) 23:20:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe}, 0x40) 23:20:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x33, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:20:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380)='batadv\x00', 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x1c, r1, 0x323eb412f0850fd1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 23:20:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00', 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}]}, 0x24}}, 0x0) 23:20:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f00000005c0)=""/4096, 0x1000000, 0x1000, 0x1}, 0x20) 23:20:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40}]) 23:20:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000005c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 23:20:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000005c0)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 23:20:47 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f00000000c0)="c2085f13ee930d97313f0801b4ad02e5ba6b51eb3a8aee892968dee0fbed380c3a601a0645299d159b41d24a9e3957bbf7dd9e4a93094831cc92c41e2163857cb22ed94013037a4726dbe31b173003a19c685daa60ad0e995580adc7d18448f1aff7141aeb3f0bce64ee95449fc29ddbe6fd4e0bbfe4dbc3663e93aed7da6a0e3c", 0x81, 0x7}, {&(0x7f0000000180)="fc0aaed012b3c39de558030dd8885e5884021b61b91a77bab140ebf3a4bbf3aed5b228605f85c18f60b2d03290b66107c90817c2d9632468815b8c8cf19864db79d20fd463f4831f28f9f8f454d9f4e16fd4cecb395b50f0b82618399d398b7493a88bbad0f54a2e21c05bf60b057c775abc10ae821cec4d873a3d786e61678e2f0d3eb3fbabfaae79925dcbd6547dea9c3f4fe3ce510fd9203e60fdc3131c", 0x9f, 0x1}], 0x801000, &(0x7f00000002c0)={[{@gid={'gid'}}], [{@uid_gt={'uid>', 0xee00}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\@-:+&'}}, {@obj_user={'obj_user'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@obj_role={'obj_role', 0x3d, '/dev/zero\x00'}}]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000480)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b780)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x2, "2231efc0dc5ba9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000048240)={0xffffffff, [], 0x0, "7832f3f0e8edaa"}) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="021a000000000000c204000000070084634fbb2c90305b80d731fb1ebd809f53a575eb05f83a281f2e8daeedf7343d3af434515d83bf5183691767960e79c543be6c484892d1457e7bed2d158e1282fe2e1859aab1ad2034c5d38277eec3f49dffef6bb24842388e43f4e8b1d9f10c7478bcb7c30b8811e4aec31116ac192e81c963603392038e10ce05b28c804d04ce1d782da103401f005810f728bf09b647cf30c2a91c51c530f6a9a006536208add0cb7e1b24b4817b93237afd6383e234a5aa36389dab6e8a1d96f250d3619a0b17e96279f0620100"], 0xd8) sendmsg$NL80211_CMD_RADAR_DETECT(r3, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x4c, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9a8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x184}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1e7}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0xc0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="021a000000000000c204000000070084634fbb2c90305b80d731fb1ebd809f53a575eb05f83a281f2e8daeedf7343d3af434515d83bf5183691767960e79c543be6c484892d1457e7bed2d158e1282fe2e1859aab1ad2034aa8e43f4e8b1d9f10c7478bcb7c30b8811e4aec31156ac192e81c963603392038e10ce05b28c804d04ce1d782da103401f005810f7284e8849bf09b647cf30c2a91c51c530f6a9a006536208add0cb7e1b24b4817b93237afd4383e234a5aa36409dab6e8a1d96f250d3619a0b17e96279f0620100"], 0xd8) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000340)={0x4, 0xf, 0x24, "c68a34d435db26bfb715d436f6049e61094802414899505aff8dae328cd12d31a6625bdc60463cc9a145fe3031febdf894c55d2ed362fe7ec6a7d901", 0x2c, "90515e589abe790a8a3cdc6db4fbec2c1d0d2bde698049addf922dda6164104f319a7302681f0558f7b710d45520b9cdd61e956c2259be387586b250", 0x110}) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) futex(0x0, 0x3, 0x0, 0x0, 0x0, 0x0) 23:20:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:20:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40}]) 23:20:47 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000080)) 23:20:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x100) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 23:20:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001180)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002040)=[{0x70, 0x0, 0x0, "24a3b25b9ab45fa6e2c71881a517493f28f01c6fcb99c7498052e60ad2f06300c55aa8586ae54b7c9833632f7e98f500c888841136e2a46c6af9af14dbd59eb28281cb57a26ad53bebee4b27de182e57d3779fc204a5861287"}, {0x1010, 0x0, 0x0, "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"}, {0x20, 0x0, 0x0, "f145056240e884ca42"}, {0xc8, 0x0, 0x0, "9c1732ede583c0ab5248a9e68070c95467d56072a846553b4cde01ef13d068e2a1165a34dc78e06ceac8a9da831d06c0cf3e99826d5124d32a778543e78d10da679d50fde38f75517bc79a7d4cb769d7ccd81719a520127e6fe9d10d1b57ac675bd7974bcdc595a807270d9074609d9e53874191def6d764eabb700faf13f30bcd6ed8287a4cf8702fb9af1c15c980b09defee4c8bef69cce90c7290beefbb21bb503368ad907fdcf003b590c44a512e92"}, {0xea0, 0x0, 0x0, "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"}], 0x2008}}], 0x1, 0x0) 23:20:47 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/180, &(0x7f0000000140)=0xb4) futex(0x0, 0x3, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x8b) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000180), 0x4) 23:20:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x6) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) 23:20:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000001380)={'macvtap0\x00', @ifru_addrs=@xdp}) 23:20:47 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) futex(0x0, 0x3, 0x0, 0x0, 0x0, 0x0) 23:20:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000005c0)={'wpan4\x00'}) 23:20:48 executing program 2: bpf$BPF_BTF_LOAD(0x1e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 23:20:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000001380)={'macvtap0\x00', @ifru_addrs=@xdp}) 23:20:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, 0x0, 0x1) 23:20:48 executing program 5: r0 = epoll_create1(0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x10000000}) 23:20:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1a000000}]}}, &(0x7f00000005c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 23:20:48 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff}) connect$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 23:20:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="dd"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001740)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xc}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x10, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_POLICE={0x4}]}}]}, 0x3c}}, 0x0) 23:20:48 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f00000000c0)='/proc/self/exe\x00', 0x101880, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x3, 0x5d2) futex(0x0, 0x3, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000300)={&(0x7f0000000040)="6f5fd551c52c", &(0x7f0000000200)=""/245, &(0x7f0000000100)="e849abcf33c9e25d93bf387cf4e7f3a759b54694b6185fb34f2b1248485581f6f28cb392872ffbeb15f76ec18498d1502f5843a892d82d9acf19f213834f155e8b80cc821f301498519e55d7ee111dec8677f4e0af2b546bf766308fa22d918fbbfa54a789ee4d6c9cc1c8077cae05a5eb1b8557458ae373c5a8d8c1c01a1d137e662757d4fd75f393b3f2", &(0x7f0000000380)="e560782a46af3945a8ff4279dc8a6e72a70a96533aeb24d760825a38fdb44bfeaed868c33d6da0bc88242cbbda4594a1aed54ce6fe72574adb0c85d68b790a22983e5e3ac66b0cecbad2a27e174e183ec04defb93db9ecee11f87fe7a8186b4e5b0e4e11b3e5e2e35e7cea18ba38f04c79f9b1efe456f8d956efe3fa8a130a0e9ee19ff8734dd5b058b6ebd8a5721ac11d10d4e2f33820297d0b7f1b8b98a80f77eafba2dc", 0x5, 0xffffffffffffffff, 0x4}, 0x38) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) writev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='0', 0x1}], 0x1) mmap(&(0x7f000065b000/0x1000)=nil, 0x1000, 0x4, 0x50, r3, 0xe4085000) 23:20:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f00000000c0)) 23:20:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000840)=@nat={'nat\x00', 0x1b, 0x5, 0x3a0, 0x260, 0x260, 0xffffffff, 0xa8, 0x1b8, 0x330, 0x330, 0xffffffff, 0x330, 0x330, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'vlan0\x00', 'sit0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @private, @rand_addr, @port, @icmp_id}}}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'vcan0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @private, @remote, @icmp_id, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x400) 23:20:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x2}]}]}}, &(0x7f00000005c0)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 23:20:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8946, &(0x7f00000001c0)={'ip6tnl0\x00', @ifru_flags}) 23:20:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @dev}, {0x0, @dev}, 0x2a, {0x2, 0x0, @empty}, 'lo\x00'}) 23:20:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x5452, &(0x7f00000001c0)={'veth1_vlan\x00', @ifru_flags}) 23:20:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, 0x0, 0x1) 23:20:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x7, 0x0, 0x0, [{}]}]}}, &(0x7f00000005c0)=""/4096, 0x32, 0x1000, 0x8}, 0x20) 23:20:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000840)=@nat={'nat\x00', 0x1b, 0x5, 0x3c8, 0x260, 0x260, 0xffffffff, 0xa8, 0x1b8, 0x330, 0x330, 0xffffffff, 0x330, 0x330, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @local, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'vlan0\x00', 'sit0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @private, @rand_addr, @port, @icmp_id}}}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'vcan0\x00', 'veth1_to_team\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @private, @remote, @icmp_id, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) 23:20:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x1}, {}]}]}}, &(0x7f00000005c0)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) 23:20:49 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) 23:20:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0xa, 0x4e20, 0x0, @private0}, 0x1c) 23:20:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f00000005c0)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 23:20:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000140)=0x6, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x1000001bd) close(r0) [ 1202.675001] x_tables: duplicate underflow at hook 1 23:20:49 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000004fc0)) 23:20:49 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) 23:20:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8924, &(0x7f00000001c0)={'veth1_vlan\x00', @ifru_flags}) 23:20:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001580)=@deltfilter={0x24, 0x2d, 0x5, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x0, 0xa}}}, 0x24}}, 0x0) 23:20:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, 0x0, 0x1) 23:20:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=@newtfilter={0x24, 0x2c, 0x1}, 0x24}}, 0x0) 23:20:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000000840)=""/246, 0x32, 0xf6, 0x1}, 0x20) 23:20:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001cc0)=""/231, 0xe7}], 0x61}}], 0x1, 0x0, 0x0) creat(0x0, 0x112) exit_group(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) preadv(r0, &(0x7f00000017c0), 0x47, 0x0, 0x0) 23:20:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000003700)={&(0x7f00000010c0)={0xa, 0x4e23, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000002440)=ANY=[@ANYBLOB="2400000000000000290000000800000000000000000010000000000000000000", @ANYRES32, @ANYBLOB="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"], 0x12b0}, 0x0) 23:20:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 23:20:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x59) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000035c0)="f30fd6de66b80a0000000f23c00f21f86635010002000f23f8660f5ed90f01cf66b93b00000066b80000010066ba000000000f30670fc72fbaf80c66b81eb0d68866efbafc0cb8e72feff30f1efe0f20e06635400000000f22e0360f2fe3", 0x5e}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000140)={0x20005, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:20:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights], 0x10}, 0x0) 23:20:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/198}], 0x10000000000003d8, 0x0, 0x0) 23:20:50 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r2 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='/dev/zero\x00') 23:20:50 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a0", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:20:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) 23:20:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x1) 23:20:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r2 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 23:20:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001cc0)=""/231, 0xe7}], 0x61}}], 0x1, 0x0, 0x0) creat(0x0, 0x112) exit_group(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) preadv(r0, &(0x7f00000017c0), 0x47, 0x0, 0x0) 23:20:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) 23:20:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) 23:20:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001cc0)=""/231, 0xe7}], 0x61}}], 0x1, 0x0, 0x0) creat(0x0, 0x112) exit_group(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) preadv(r0, &(0x7f00000017c0), 0x47, 0x0, 0x0) 23:20:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x59) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000035c0)="f30fd6de66b80a0000000f23c00f21f86635010002000f23f8660f5ed90f01cf66b93b00000066b80000010066ba000000000f30670fc72fbaf80c66b81eb0d68866efbafc0cb8e72feff30f1efe0f20e06635400000000f22e0360f2fe3", 0x5e}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000140)={0x20005, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:20:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) 23:20:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001cc0)=""/231, 0xe7}], 0x61}}], 0x1, 0x0, 0x0) creat(0x0, 0x112) exit_group(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) preadv(r0, &(0x7f00000017c0), 0x47, 0x0, 0x0) 23:20:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r2 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2011, r2, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 23:20:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001cc0)=""/231, 0xe7}], 0x61}}], 0x1, 0x0, 0x0) creat(0x0, 0x112) exit_group(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) preadv(r0, &(0x7f00000017c0), 0x47, 0x0, 0x0) 23:20:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r2 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2011, r2, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 23:20:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) 23:20:52 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipv6_route\x00') read$FUSE(r2, 0x0, 0x0) 23:20:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001cc0)=""/231, 0xe7}], 0x61}}], 0x1, 0x0, 0x0) creat(0x0, 0x112) exit_group(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) preadv(r0, &(0x7f00000017c0), 0x47, 0x0, 0x0) 23:20:52 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r2 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2011, r2, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 23:20:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x59) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000035c0)="f30fd6de66b80a0000000f23c00f21f86635010002000f23f8660f5ed90f01cf66b93b00000066b80000010066ba000000000f30670fc72fbaf80c66b81eb0d68866efbafc0cb8e72feff30f1efe0f20e06635400000000f22e0360f2fe3", 0x5e}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000140)={0x20005, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:20:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r2, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/161, 0xa1}], 0x1, 0x4, 0x0) 23:20:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x19}) 23:20:52 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r2 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2011, r2, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) 23:20:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@deltclass={0x24, 0x1e, 0x1}, 0x24}}, 0x0) 23:20:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001cc0)=""/231, 0xe7}], 0x61}}], 0x1, 0x0, 0x0) exit_group(0x0) preadv(r0, &(0x7f00000017c0), 0x47, 0x0, 0x0) 23:20:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) 23:20:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x3}) 23:20:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x59) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f00000035c0)="f30fd6de66b80a0000000f23c00f21f86635010002000f23f8660f5ed90f01cf66b93b00000066b80000010066ba000000000f30670fc72fbaf80c66b81eb0d68866efbafc0cb8e72feff30f1efe0f20e06635400000000f22e0360f2fe3", 0x5e}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000140)={0x20005, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:20:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001cc0)=""/231, 0xe7}], 0x61}}], 0x1, 0x0, 0x0) creat(0x0, 0x112) exit_group(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) preadv(r0, &(0x7f00000017c0), 0x47, 0x0, 0x0) 23:20:53 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000080)=0x80) getsockopt$sock_buf(r1, 0x1, 0x0, 0x0, 0x0) 23:20:53 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2011, r0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 23:20:53 executing program 2: r0 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/8, 0x8) 23:20:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ipv6_route\x00') preadv(r2, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000140)=""/102, 0x66}], 0x2, 0x0, 0x0) 23:20:53 executing program 1: ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400854d5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {}, {0x9}]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) 23:20:53 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp\x00') read$FUSE(r2, 0x0, 0x0) 23:20:53 executing program 0: socketpair(0xa, 0x3, 0x5, &(0x7f00000003c0)) 23:20:53 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, 0x0) 23:20:53 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp\x00') read$FUSE(r2, 0x0, 0x0) 23:20:53 executing program 2: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 23:20:54 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') 23:20:54 executing program 0: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RCLUNK(r0, 0x0, 0x0) 23:20:54 executing program 4: pipe2$9p(&(0x7f0000002080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 23:20:54 executing program 2: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) 23:20:54 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp\x00') read$FUSE(r2, 0x0, 0x0) 23:20:54 executing program 5: shmget(0x0, 0x2000, 0x600, &(0x7f0000ffb000/0x2000)=nil) 23:20:54 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x42082, 0x0) 23:20:54 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) unlinkat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) 23:20:54 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000013200)=0xfffffffffffffe9a) 23:20:54 executing program 5: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 23:20:54 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x8000) 23:20:54 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp\x00') read$FUSE(r2, 0x0, 0x0) 23:20:54 executing program 0: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 23:20:54 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 23:20:54 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) 23:20:54 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 23:20:54 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_proto_private(r0, 0x0, 0x0) 23:20:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) 23:20:54 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x448100, 0x0) 23:20:54 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2040, 0x42) 23:20:54 executing program 2: semget$private(0x0, 0x1, 0x518) 23:20:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 23:20:54 executing program 1: semget$private(0x0, 0x3, 0x110) 23:20:54 executing program 3: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$9p(r0, 0x0, 0x0) 23:20:54 executing program 2: statx(0xffffffffffffffff, &(0x7f0000001400)='./file0\x00', 0x0, 0x0, 0x0) 23:20:54 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, 0x0) 23:20:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x6400, 0x0) 23:20:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:20:54 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) 23:20:54 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 23:20:55 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) 23:20:55 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0xc7863020e3a96435) 23:20:55 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 23:20:55 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xee00, 0x0, 0xee00, 0xffffffffffffffff}}) 23:20:55 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) 23:20:55 executing program 3: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, 0x0, 0x0) 23:20:55 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, 0x0) 23:20:55 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) 23:20:55 executing program 1: pipe2$9p(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, 0x0, 0x0) 23:20:55 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, 0x0, 0x4000880) 23:20:55 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) readlinkat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/165, 0xa5) 23:20:55 executing program 4: select(0x40, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000240)) 23:20:55 executing program 0: r0 = openat$zero(0xffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x0, 0x0) 23:20:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x40008c4, 0x0, 0xffffff41) 23:20:55 executing program 5: openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x8000, 0x0) 23:20:55 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x27, 0x0) 23:20:55 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000380)={{}, {0x0, 0xea60}}, 0x0) 23:20:55 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSRS485(r0, 0x542f, 0x0) 23:20:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, 0x0, 0x0) 23:20:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) bind(r0, 0x0, 0x0) 23:20:55 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000380)={{}, {0x0, 0xea60}}, 0x100) 23:20:55 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 23:20:55 executing program 0: tkill(0x0, 0x0) 23:20:55 executing program 3: semget$private(0x0, 0x4, 0x4d0) 23:20:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendto(r0, 0x0, 0x49, 0x0, 0x0, 0x0) 23:20:55 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), 0x8) 23:20:55 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 23:20:55 executing program 1: clock_gettime(0x0, &(0x7f0000000880)) 23:20:55 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f000000c080)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 23:20:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 23:20:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:20:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) 23:20:56 executing program 5: openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x8040, 0x0) 23:20:56 executing program 0: semget$private(0x0, 0x4, 0x111) 23:20:56 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, 0x0, 0x0) 23:20:56 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) 23:20:56 executing program 4: timerfd_create(0x0, 0x40800) 23:20:56 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2001, 0x0) write$P9_RWALK(r0, 0x0, 0x0) 23:20:56 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, 0x0, 0x0) 23:20:56 executing program 5: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLINK(r0, 0x0, 0x0) 23:20:56 executing program 3: mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) 23:20:56 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x40000000) 23:20:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x161) 23:20:56 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), &(0x7f0000000940)={0x0}) 23:20:56 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$CHAR_RAW_HDIO_GETGEO(r0, 0x301, 0x0) 23:20:56 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000000)={'lo\x00', @ifru_map}) 23:20:56 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x2001, 0x0) 23:20:57 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 23:20:57 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000003fc0)=""/192, 0xc0, 0x0, 0x0, 0x0) 23:20:57 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) 23:20:57 executing program 3: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) 23:20:57 executing program 2: semget$private(0x0, 0x1, 0x8bd6861852eb8bc8) 23:20:57 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x85a40, 0x0) 23:20:57 executing program 4: pselect6(0x0, 0x0, 0x0, &(0x7f0000000840), &(0x7f00000008c0), 0x0) 23:20:57 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x200440, 0x0) 23:20:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/141, 0x8d}], 0x1}, 0x0) 23:20:57 executing program 3: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLCREATE(r0, 0x0, 0x0) 23:20:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000003fc0)=""/192, 0xc0, 0x41, 0x0, 0x0) 23:20:57 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x100) 23:20:57 executing program 3: r0 = epoll_create(0x10000) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 23:20:58 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x103) 23:20:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, 0x0) 23:20:58 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 23:20:58 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x200000, 0x0) 23:20:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x0) 23:20:58 executing program 5: r0 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x3000) 23:20:58 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x103000, 0x0) 23:20:58 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/141, 0x8d}], 0x1}, 0x0) 23:20:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 23:20:58 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x12b3fac8ab0c1c73) 23:20:58 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x10040, 0x0) 23:20:58 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) 23:20:58 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) sendmmsg$inet(r0, 0x0, 0x0, 0x8000) 23:20:58 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000)='net_prio.ifpriomap\x00', 0x2, 0x0) 23:20:58 executing program 4: shmget(0x2, 0x4000, 0x200, &(0x7f0000ffa000/0x4000)=nil) 23:20:58 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000180)='net_prio.ifpriomap\x00', 0x2, 0x0) 23:20:58 executing program 5: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) 23:20:58 executing program 0: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r0, 0x0, 0x0) 23:20:58 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000800)='/dev/urandom\x00', 0x410000, 0x0) 23:20:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/141, 0x8d}], 0x1}, 0x0) 23:20:59 executing program 4: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, 0x0, 0xfffffffffffffe8c) 23:20:59 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40402, 0x0) write$P9_RLERRORu(r0, 0x0, 0x0) 23:20:59 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 23:20:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x8050, 0x0, 0xc7863020e3a96435) 23:20:59 executing program 0: semget$private(0x0, 0x4, 0x141) 23:20:59 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0x0) 23:20:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00'}) 23:20:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 23:20:59 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$CHAR_RAW_SECDISCARD(r0, 0x127d, 0x0) 23:20:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x0) 23:20:59 executing program 4: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18}, 0xfffffffffffffcdc) 23:21:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/141, 0x8d}], 0x1}, 0x0) 23:21:00 executing program 0: getrandom(&(0x7f0000000080)=""/236, 0xec, 0x2) 23:21:00 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 23:21:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000100)=0x80) getsockname(r1, 0x0, 0x0) 23:21:00 executing program 5: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, 0x0, 0x0) 23:21:00 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x24004055, 0x0, 0x0) 23:21:00 executing program 0: pselect6(0x40, &(0x7f00000007c0), 0x0, 0x0, &(0x7f00000008c0), &(0x7f0000000940)={0x0}) 23:21:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmsg(r0, 0x0, 0x0) 23:21:00 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 23:21:00 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f000000c080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_STATFS(r0, 0x0, 0x0) 23:21:00 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') 23:21:00 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 23:21:01 executing program 0: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, 0x0, 0xfffffffffffffcef) 23:21:01 executing program 2: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) 23:21:01 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffcd) 23:21:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x0, &(0x7f0000004080)=@ieee802154={0x24, @long}, 0x80) 23:21:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 23:21:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 23:21:01 executing program 0: semget$private(0x0, 0x2, 0x479) 23:21:01 executing program 2: pselect6(0x0, 0x0, 0x0, &(0x7f0000000840), &(0x7f00000008c0), &(0x7f0000000940)={0x0}) 23:21:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40, 0x0) 23:21:01 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBENT(r0, 0x4b46, 0x0) 23:21:01 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2040, 0x0) 23:21:01 executing program 5: pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWALK(r0, 0x0, 0x0) 23:21:01 executing program 4: semget$private(0x0, 0x3, 0x10) 23:21:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 23:21:01 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2040, 0x0) 23:21:02 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) utimensat(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) 23:21:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 23:21:02 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0xfffffffffffffce6) 23:21:02 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) 23:21:02 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2040, 0x0) 23:21:02 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, 0x0) 23:21:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x3d0, 0x1ec, 0x10c, 0x0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @empty, @private}}}, {{@arp={@dev, @multicast1, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'nr0\x00', 'macvlan1\x00'}, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'wlan1\x00'}, 0xbc, 0x104}, @unspec=@NFQUEUE1={0x0, 'NFQUEUE\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0xfffffffffffffebd) 23:21:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000040)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000000)=[{}], 0x0, [{}]}, 0xfffffffffffffddc) 23:21:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='&.\\\x00', r0) 23:21:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000014c0)={&(0x7f00000000c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x434, 0x11d, 0x0, 0x1, [{0x1e8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x1d4, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x3c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x5, 0x2, [{}]}, @NL80211_TXRATE_HT={0x11, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_60GHZ={0x40, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x9, 0x2, [{}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_60GHZ={0x34, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x19, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_60GHZ={0x18, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_6GHZ={0x18, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_60GHZ={0x14, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0xd, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_5GHZ={0x68, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x45, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_5GHZ={0x74, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_HT={0x35, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}]}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}]}, {0x1f4, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x1cc, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x38, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x31, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_5GHZ={0x64, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x94, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x19, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x25, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_60GHZ={0x98, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x21, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x2d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x5, 0x2, [{}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}]}]}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}]}]}, @NL80211_ATTR_TID_CONFIG={0x8e0, 0x11d, 0x0, 0x1, [{0x20, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}]}, {0x568, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8c, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x88, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x1d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x9, 0x2, [{}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}]}]}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x3b8, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x28, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x5, 0x1, [0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_5GHZ={0x58, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x41, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_5GHZ={0x50, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_5GHZ={0x9c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x3d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_5GHZ={0x6c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x4d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_5GHZ={0x3c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x9, 0x2, [{}, {}, {}, {}, {}]}]}, @NL80211_BAND_60GHZ={0x5c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x21, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x0]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x28, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x0]}]}, @NL80211_BAND_6GHZ={0x3c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x19, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0xe0, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x39, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x45, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}]}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0xe4, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x6c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x15, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x40, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x25, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x34, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x9, 0x2, [{}, {}, {}, {}, {}]}]}]}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5}]}, {0x25c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x234, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xd0, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x3d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x4d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x0]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_5GHZ={0xb4, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x45, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0xac, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x3d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x5, 0x2, [{}]}, @NL80211_TXRATE_HT={0x11, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}]}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}]}, {0x40, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc}]}]}, @NL80211_ATTR_TID_CONFIG={0x194, 0x11d, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}]}, {0x180, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x15c, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x84, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x19, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_5GHZ={0xa4, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x41, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x29, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_60GHZ={0x30, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}]}]}]}]}, 0xec4}}, 0x0) 23:21:02 executing program 3: add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='}', 0x1, 0xffffffffffffffff) 23:21:02 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2040, 0x0) 23:21:02 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000013140)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, 0x0) 23:21:02 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200)='logon\x00', &(0x7f0000000280)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f00000002c0)={0x0, "92010462ce9307fe1716e45e2f0bcffc04598fc8d38f90d444b7c0d1686a0be196afd879ae5fecc9626af9894900"}, 0x48, 0xfffffffffffffffd) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='keyring\x00', r0) 23:21:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x7, &(0x7f0000000a80)={@multicast1, @empty}, 0x8) 23:21:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000000)={'veth1_macvtap\x00', @ifru_hwaddr=@broadcast}) 23:21:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) pipe(&(0x7f0000000000)) 23:21:02 executing program 2: openat$nvram(0xffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x181, 0x0) 23:21:02 executing program 1: clock_adjtime(0x2, 0x0) 23:21:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0xffe, 0x84, 0x800, 0x0, 0x1}, 0x40) 23:21:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000000)=""/199) 23:21:03 executing program 4: mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 23:21:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000013c0)=@nat={'nat\x00', 0x19, 0x5, 0x1002, [0x20000300, 0x0, 0x0, 0x20000dc8, 0x20000df8], 0x0, 0x0, &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{0x0, 0x0, 0x0, 'erspan0\x00', 'wlan1\x00', 'veth0_to_hsr\x00', 'veth1_vlan\x00', @link_local, [], @random="80662d3e0313", [], 0x926, 0x986, 0x9d2, [@among={{'among\x00', 0x0, 0x894}, {{@offset, @offset, 0x0, {[], 0x4, [{[], @multicast2}, {[], @multicast2}, {[], @empty}, {[], @initdev={0xac, 0x1e, 0x0, 0x0}}]}, {[], 0x6, [{[], @dev}, {[], @multicast1}, {[], @private}, {[], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[], @remote}, {[], @initdev={0xac, 0x1e, 0x0, 0x0}}]}}}}], [@snat={'snat\x00', 0xc, {{@dev}}}, @snat={'snat\x00', 0xc}], @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}, {0x0, 0x0, 0x0, 'gre0\x00', 'veth0_vlan\x00', 'team_slave_1\x00', 'virt_wifi0\x00', @local, [], @empty, [], 0x6e, 0x6e, 0x9e, [], [], @arpreply={'arpreply\x00', 0xc, {{@dev}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x2, [{0x0, 0x0, 0x0, 'hsr0\x00', 'veth1_vlan\x00', 'team_slave_0\x00', 'macvtap0\x00', @link_local, [], @multicast, [], 0xa2, 0xd2, 0x102, [@cluster={{'cluster\x00', 0x0, 0x10}}], [@snat={'snat\x00', 0xc, {{@dev}}}], @common=@dnat={'dnat\x00', 0xc, {{@link_local}}}}, {0x0, 0x0, 0x0, 'wg2\x00', 'rose0\x00', 'ip6_vti0\x00', 'veth1_virt_wifi\x00', @remote, [], @empty, [], 0x2a2, 0x302, 0x332, [@bpf0={{'bpf\x00', 0x0, 0x210}}], [@snat={'snat\x00', 0xc, {{@broadcast}}}, @snat={'snat\x00', 0xc}], @arpreply={'arpreply\x00', 0xc, {{@remote}}}}]}, {0x0, '\x00', 0x4, 0x0, 0x1, [{0x0, 0x0, 0x0, 'ipvlan0\x00', 'veth0_macvtap\x00', 'team0\x00', 'batadv_slave_1\x00', @random="51fe9310df7c", [], @multicast, [], 0x6e, 0x6e, 0x9e, [], [], @snat={'snat\x00', 0xc, {{@multicast}}}}]}]}, 0x10d6) 23:21:03 executing program 3: r0 = socket(0xa, 0x3, 0x8) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, 0x0, 0x0) 23:21:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x484, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f0, 0x3f0, 0x3f0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x2a0, 0x2c4, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x94}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x4e0) 23:21:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), 0x0) 23:21:03 executing program 5: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x280) 23:21:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @remote}, {}, 0x28, {0x2, 0x0, @private=0xa010100}, 'batadv_slave_0\x00'}) 23:21:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x3b0, 0x0, 0x0, 0x10c, 0x2d0, 0x2d0, 0x2d0, 0x4, 0x0, {[{{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @loopback, @private}}}, {{@arp={@remote, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_vlan\x00', 'macvtap0\x00', {}, {}, 0x0, 0x419}, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@uncond, 0xbc, 0xe4}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3fc) 23:21:03 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x9}) 23:21:03 executing program 5: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xc, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 23:21:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000000)={'ip6gretap0\x00', @ifru_mtu}) 23:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x290, 0x100, 0xffffffff, 0xffffffff, 0x100, 0xffffffff, 0x1fc, 0xffffffff, 0xffffffff, 0x1fc, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xb8, 0x100, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}, {0x1b}}, @inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x94, 0xfc, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2ec) 23:21:03 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x800) epoll_pwait(r0, &(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) 23:21:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x3d4, 0x1cc, 0x1cc, 0x1cc, 0x2f4, 0x2f4, 0x2f4, 0x4, 0x0, {[{{@arp={@multicast2, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@random="8c3f449339fd"}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'wlan1\x00', 'vxcan1\x00'}, 0xbc, 0xec}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@uncond, 0xbc, 0x128}, @unspec=@NFLOG={0x6c, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "16f547ed4e846ea04b79b4d0e904369ef658081d44c5aa1dc7675feb6ad9fe6cadb9414ea235c21b12edeef8d6708420d67dfc73b39d17e04bbb8497ef5dec0a"}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x420) 23:21:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000a80)={@multicast2, @loopback}, 0x8) 23:21:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x8, {0x2, 0x0, @multicast1}}) 23:21:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000580)=ANY=[@ANYRESHEX], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB='h\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r2], 0x68}}, 0x0) 23:21:03 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) fork() 23:21:03 executing program 2: openat$cgroup_root(0xffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 23:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000100)) 23:21:03 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x3b, 0x81) 23:21:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x574, 0x1a8, 0x0, 0xf0, 0x1a8, 0x1a8, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x4e0, 0x6, 0x0, {[{{@uncond, 0x0, 0xcc, 0xf0, 0x0, {}, [@common=@unspec=@quota={{0x38, 'quota\x00'}}, @inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @TTL={0x24, 'TTL\x00'}}, {{@uncond, 0x0, 0x94, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @TTL={0x24, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @random="0cca162a293a"}}}, {{@uncond, 0x0, 0x9c, 0xc0, 0x0, {}, [@common=@ah={{0x2c, 'ah\x00'}}]}, @ECN={0x24, 'ECN\x00'}}, {{@uncond, 0x0, 0x14c, 0x1ac, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv6=@private0, [], @ipv6=@private0, [], @ipv6=@mcast1, [], @ipv4=@empty}}}, @inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x5d0) [ 1216.758328] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1216.833057] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.4'. 23:21:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x290, 0x100, 0xffffffff, 0xffffffff, 0x100, 0xffffffff, 0x1fc, 0xffffffff, 0xffffffff, 0x1fc, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xb8, 0x100, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}, @inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x94, 0xfc, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2ec) 23:21:03 executing program 1: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 23:21:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x5, 0x4) 23:21:03 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x2801) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 23:21:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_hwaddr=@broadcast}) 23:21:03 executing program 5: r0 = openat$zero(0xffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x240002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 23:21:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xd, &(0x7f0000000000)=0x9, 0x4) 23:21:04 executing program 1: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 23:21:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x464, 0x270, 0x0, 0x0, 0x110, 0x270, 0x3d0, 0x3d0, 0x3d0, 0x3d0, 0x3d0, 0x6, 0x0, {[{{@uncond, 0x0, 0xec, 0x110, 0x0, {}, [@common=@inet=@l2tp={{0x2c, 'l2tp\x00'}}, @common=@osf={{0x50, 'osf\x00'}, {'syz1\x00'}}]}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth1\x00', 'lo\x00'}, 0x0, 0x70, 0x94}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_virt_wifi\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}, {{@uncond, 0x0, 0x70, 0x94}, @TTL={0x24, 'TTL\x00'}}, {{@ip={@multicast1, @remote, 0x0, 0x0, 'wg2\x00', 'geneve1\x00'}, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x4c0) 23:21:04 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:21:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x3ac, 0x1ec, 0xe0, 0x0, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@uncond, 0xbc, 0xe0}, @unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00'}}, {{@arp={@rand_addr, @multicast1, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'gretap0\x00', 'veth1_to_bridge\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @mac=@broadcast, @private, @local, 0x8}}}, {{@uncond, 0xbc, 0xe0}, @unspec=@NFQUEUE1={0x24, 'NFQUEUE\x00', 0x1, {0x0, 0xb7}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x7, 0x4, 0x3b0, 0x0, 0x1ec, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x4, 0x0, {[{{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @broadcast, @dev, 0x9}}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@multicast}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'wlan1\x00', 'team0\x00'}, 0xbc, 0xe0}, @unspec=@NFQUEUE1={0x24, 'NFQUEUE\x00', 0x1, {0x0, 0x6}}}, {{@uncond, 0xbc, 0xe4}, @unspec=@MARK={0x28, 'MARK\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3fc) 23:21:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:21:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newspdinfo={0x24, 0x24, 0x12f, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x24}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) 23:21:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xe) 23:21:04 executing program 1: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 23:21:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00', 0x7, 0x4, 0x380, 0xe0, 0xe0, 0xe0, 0x2a0, 0x2a0, 0x2a0, 0x4, 0x0, {[{{@arp={@private, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv_slave_1\x00', 'batadv_slave_1\x00'}, 0xbc, 0xe0}, @unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00'}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3cc) 23:21:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000080)={'veth1_to_bridge\x00', @ifru_flags}) 23:21:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x6, @broadcast, 0x0, 0x4, 'sh\x00'}, {@empty, 0x0, 0x0, 0x0, 0x0, 0x1f}}, 0x44) 23:21:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2000) 23:21:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00', 0x7, 0x4, 0x380, 0xe0, 0xe0, 0xe0, 0x2a0, 0x2a0, 0x2a0, 0x4, 0x0, {[{{@arp={@private, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv_slave_1\x00', 'batadv_slave_1\x00'}, 0xbc, 0xe0}, @unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00'}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3cc) 23:21:04 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='devices.list\x00', 0x275a, 0x0) unshare(0x8020600) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0xc, r1}) 23:21:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) recvmsg(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x40000121) 23:21:04 executing program 1: add_key$fscrypt_v1(&(0x7f0000000200)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='keyring\x00', 0x0) 23:21:04 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x29c, 0xe8, 0xffffffff, 0xffffffff, 0xe8, 0xffffffff, 0x208, 0xffffffff, 0xffffffff, 0x208, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xb8, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}, @inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{}, {0x3}}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'veth1_to_batadv\x00', 'syz_tun\x00'}, 0x0, 0xb8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}, @inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2f8) 23:21:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00', 0x7, 0x4, 0x380, 0xe0, 0xe0, 0xe0, 0x2a0, 0x2a0, 0x2a0, 0x4, 0x0, {[{{@arp={@private, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv_slave_1\x00', 'batadv_slave_1\x00'}, 0xbc, 0xe0}, @unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00'}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3cc) 23:21:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @loopback, 0x0, 0x4, 'wlc\x00', 0x0, 0x81, 0x5}, 0x2c) 23:21:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 23:21:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='\xb4{\x00', r0) 23:21:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) r3 = dup3(r0, r1, 0x0) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="0503092c1116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 23:21:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00', 0x7, 0x4, 0x380, 0xe0, 0xe0, 0xe0, 0x2a0, 0x2a0, 0x2a0, 0x4, 0x0, {[{{@arp={@private, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv_slave_1\x00', 'batadv_slave_1\x00'}, 0xbc, 0xe0}, @unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00'}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3cc) 23:21:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000ac0)={0x4, {{0x2, 0x0, @multicast2}}, 0x0, 0xa, [{{0x2, 0x0, @loopback}}, {{0x2, 0x0, @local}}, {}, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @private}}, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x0, @loopback}}]}, 0x58c) 23:21:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:21:05 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='devices.list\x00', 0x275a, 0x0) unshare(0x8020600) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0xc, r1}) 23:21:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:21:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000040)) 23:21:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x16, 0x0, &(0x7f0000000040)) 23:21:05 executing program 2: rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0xffffffff}) 23:21:05 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x37, 0x9) 23:21:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x1a, 0x2, 0x0, 0x0, 0x0, {[@timestamp={0x4, 0xa}, @exp_smc={0xfe, 0x6}, @fastopen={0x22, 0x3, '\x00'}, @mptcp=@ack={0x1e, 0x12, 0x0, 0x4, "9f00d3a9c1e5b83ff2096d6e619d"}, @mptcp=@remove_addr={0x1e, 0x10, 0x0, 0x0, "13b13200f7046e7ac95e086406"}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "2c415bb5e4f1459ea69359b5512663cc"}]}}}}}}}, 0x0) 23:21:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000000)={'macvlan1\x00', @ifru_flags}) 23:21:05 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='devices.list\x00', 0x275a, 0x0) unshare(0x8020600) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0xc, r1}) 23:21:05 executing program 5: r0 = fork() ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) ptrace$getenv(0x4201, r0, 0x0, 0x0) 23:21:05 executing program 2: r0 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000000)=""/203, 0xcb) 23:21:05 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000a80)={@broadcast, @broadcast}, 0x8) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @loopback, 0x0, 0x3, 'lblc\x00', 0x0, 0x81, 0x7d}, 0x2c) 23:21:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @loopback, 0x0, 0x100004, 'dh\x00', 0x0, 0x81, 0x13}, 0x2c) [ 1218.695390] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:21:05 executing program 2: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000140)) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 23:21:05 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='devices.list\x00', 0x275a, 0x0) unshare(0x8020600) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0xc, r1}) 23:21:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x3f, 0x4) 23:21:05 executing program 0: r0 = fork() ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, &(0x7f00000000c0)) ptrace$getenv(0x4201, r0, 0x0, &(0x7f0000000400)) 23:21:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) 23:21:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 23:21:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000000)={'bridge0\x00', @ifru_flags}) 23:21:06 executing program 1: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 23:21:06 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'team_slave_1\x00'}, 0x18) 23:21:06 executing program 3: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/100) 23:21:06 executing program 0: r0 = fork() ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, &(0x7f00000000c0)) ptrace$getenv(0x4201, r0, 0x0, &(0x7f0000000400)) 23:21:06 executing program 2: add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 23:21:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newspdinfo={0x1c, 0x24, 0x12f, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) 23:21:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x290, 0x100, 0xffffffff, 0xffffffff, 0x100, 0xffffffff, 0x1fc, 0xffffffff, 0xffffffff, 0x1fc, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xb8, 0x100, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}, @inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0xffff, 'pptp\x00'}}}, {{@uncond, 0x0, 0x94, 0xfc, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2ec) 23:21:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000280), 0x4) 23:21:06 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20000016}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x114031, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 23:21:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @local}, {0x6}, 0x0, {0x2, 0x0, @local}, 'veth0_to_hsr\x00'}) 23:21:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_ifreq(r0, 0x8946, 0x0) [ 1219.681050] IPVS: sync thread started: state = MASTER, mcast_ifn = team_slave_1, syncid = 0, id = 0 23:21:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newspdinfo={0x1c, 0x24, 0x12f, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) 23:21:06 executing program 0: r0 = fork() ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, &(0x7f00000000c0)) ptrace$getenv(0x4201, r0, 0x0, &(0x7f0000000400)) 23:21:06 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x37, 0x9) set_mempolicy(0x0, 0x0, 0x0) 23:21:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000100)="5a15", 0x2, r0) 23:21:06 executing program 2: setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x3d0, 0x0, 0x0, 0x0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @loopback, @private}}}, {{@uncond, 0xbc, 0xe0}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00'}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {@empty, {[0x0, 0x0, 0x0, 0xff]}}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'wlan1\x00'}, 0xbc, 0x104}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x41c) 23:21:06 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20000016}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x114031, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 23:21:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00', 0x7, 0x4, 0x39c, 0x1dc, 0x0, 0x0, 0x2bc, 0x2bc, 0x2bc, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0xfffffffffffffffe}}, {{@uncond, 0xbc, 0xfc}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "100c9fb63415dab9f2c66793b27c265733dbf07f1c23c0d4c40e4be0f6b6"}}, {{@uncond, 0xbc, 0xe0}, @unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3e8) 23:21:07 executing program 0: r0 = fork() ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, &(0x7f00000000c0)) ptrace$getenv(0x4201, r0, 0x0, &(0x7f0000000400)) 23:21:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newspdinfo={0x1c, 0x24, 0x12f, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) 23:21:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20000016}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x114031, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 23:21:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 23:21:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @empty}, 0xc) 23:21:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20000016}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x114031, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 23:21:07 executing program 5: set_mempolicy(0x0, 0x0, 0x1) 23:21:07 executing program 0: openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x4082, 0x0) 23:21:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, 0x0}, 0x40012002) 23:21:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newspdinfo={0x1c, 0x24, 0x12f, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) 23:21:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f00000001c0)) 23:21:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @remote, 0x4e20, 0x0, 'none\x00', 0x7, 0x8, 0x15}, 0x2c) 23:21:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000480)="d8", 0x1) 23:21:07 executing program 0: timerfd_settime(0xffffffffffffffff, 0x135770a0ca44203d, &(0x7f00000000c0)={{}, {0x77359400}}, 0x0) 23:21:07 executing program 5: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil], 0x0, &(0x7f0000000180), 0x0) 23:21:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) unshare(0x8000400) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fchmod(r2, 0x0) 23:21:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000300)={'vlan0\x00', @ifru_flags}) [ 1220.809258] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xc7e/0xec0 23:21:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x7, 0x4, 0x3ac, 0x0, 0x1ec, 0x1ec, 0x2cc, 0x2cc, 0x2cc, 0x4, 0x0, {[{{@uncond, 0xbc, 0xe0}, @unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00', 0x0, {0x7}}}, {{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x2, 0x1}}}, {{@arp={@broadcast, @loopback, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {@mac=@remote}, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 'hsr0\x00', 'veth1_to_batadv\x00', {}, {}, 0x0, 0x200}, 0xbc, 0xe0}, @unspec=@AUDIT={0x24, 'AUDIT\x00', 0x0, {0x2}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x3f8) 23:21:07 executing program 3: r0 = openat$nvram(0xffffff9c, &(0x7f0000000600)='/dev/nvram\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4004700e, 0x0) 23:21:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) unshare(0x8000400) getdents(0xffffffffffffffff, 0x0, 0x0) 23:21:07 executing program 1: sendmsg$AUDIT_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 23:21:07 executing program 0: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, 0x0) 23:21:08 executing program 2: request_key(&(0x7f0000000600)='logon\x00', &(0x7f0000000640)={'syz', 0x2}, 0x0, 0x0) 23:21:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000000)="d8", 0xfffffffffffffe38) 23:21:08 executing program 2: mlock2(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) 23:21:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @loopback, 0x0, 0x4, 'rr\x00'}, 0x2c) 23:21:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891b, &(0x7f0000000140)={'batadv_slave_1\x00', @ifru_flags}) 23:21:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xffff, 0x0) ioctl$BLKRAGET(r0, 0x1263, 0x0) 23:21:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x12, &(0x7f0000000000)='\v', 0x1) 23:21:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000440)={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, r2}, 0xc) 23:21:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000400)={'filter\x00', 0x7, 0x4, 0x3dc, 0xe4, 0x1f0, 0x0, 0x2fc, 0x2fc, 0x2fc, 0x4, 0x0, {[{{@uncond, 0xbc, 0xe4}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x2}}}, {{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @multicast2}}}, {{@arp={@rand_addr, @dev, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth1_to_hsr\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="0cd3e0c0c848", @empty, @empty, @loopback}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x428) 23:21:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, 0x0) 23:21:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200)={0x0, 0x0, 0xfffffffe}, 0xc) 23:21:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000440)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 23:21:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x6, 0x101}, 0x14}}, 0x0) 23:21:08 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) unshare(0x8000400) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') getdents(r2, 0x0, 0x0) 23:21:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0xb}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) socket$inet_udplite(0x2, 0x2, 0x88) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) connect$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x2}, 0x6e) 23:21:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x8d) 23:21:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$inet(r0, 0x0, 0x0, 0x0) 23:21:08 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 23:21:09 executing program 3: sync() r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f0000000200)=0x10, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @rand_addr, @remote}, 0xc) 23:21:09 executing program 2: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 23:21:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x3d8, 0x218, 0x10c, 0x218, 0x2f8, 0x2f8, 0x2f8, 0x4, 0x0, {[{{@arp={@remote, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_1\x00', 'macsec0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@remote, @local, @loopback, 0x2}}}, {{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="45e31fa26913", @mac=@broadcast, @empty, @rand_addr, 0x1}}}, {{@arp={@rand_addr, @empty, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6gre0\x00', 'netdevsim0\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24, '\x00', 0x0, 0xfffffffffffffffe}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x424) 23:21:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x19, 0x2, 0x0, 0x0, 0x0, {[@timestamp={0x4, 0xa}, @exp_smc={0xfe, 0x6}, @fastopen={0x22, 0x3, '\x00'}, @mptcp=@ack={0x1e, 0x12, 0x0, 0x4, "9f00d3a9c1e5b83ff2096d6e619d"}, @mptcp=@remove_addr={0x1e, 0x10, 0x0, 0x0, "13b13200f7046e7ac95e086406"}, @sack={0x5, 0x6, [0x0]}, @md5sig={0x13, 0x12, "2c415bb5e4f1459ea69359b5512663cc"}]}}}}}}}, 0x0) 23:21:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000140)) [ 1222.121257] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:21:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000100)) 23:21:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0xb}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) socket$inet_udplite(0x2, 0x2, 0x88) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) connect$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x2}, 0x6e) [ 1222.308748] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:21:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0xb}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) socket$inet_udplite(0x2, 0x2, 0x88) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) connect$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x2}, 0x6e) 23:21:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)={'raw\x00', 0x3, [{}, {}, {}]}, 0x54) 23:21:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000080)) 23:21:09 executing program 4: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) pipe(&(0x7f0000000140)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 23:21:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)="4b91adb96cf8626baf3d4120656130f1", 0x10) 23:21:09 executing program 1: clock_gettime(0x1, &(0x7f0000000100)) [ 1222.558875] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:21:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x894a, 0x0) 23:21:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000000), 0x0) 23:21:09 executing program 4: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x9, 0xffffffffffffffff) 23:21:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x4d4, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f0, 0x3f0, 0x3f0, 0xffffffff, 0x4, &(0x7f0000000580), {[{{@uncond, 0x0, 0x2a0, 0x2c4, 0x0, {}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x94}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x29a) 23:21:09 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file2\x00') 23:21:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0xb}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) socket$inet_udplite(0x2, 0x2, 0x88) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) connect$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x2}, 0x6e) 23:21:10 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000300)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001400010000000000000003000a400000", @ANYRES32=r4, @ANYBLOB="080008009c0500001400010000000000000000000000000000000001"], 0x34}}, 0x0) 23:21:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:21:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0xb}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) socket$inet_udplite(0x2, 0x2, 0x88) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) connect$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x2}, 0x6e) 23:21:10 executing program 4: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x42ef6169, 0x0) 23:21:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x4, &(0x7f0000000a80)={@empty, @broadcast}, 0x8) 23:21:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000ac0)=@filter={'filter\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x188, 0xf4, 0xf4, 0xffffffff, 0xffffffff, 0x21c, 0x21c, 0x21c, 0xffffffff, 0x4, 0x0, {[{{@ip={@loopback, @rand_addr, 0x0, 0x0, 'sit0\x00', 'veth1_vlan\x00'}, 0x0, 0x94, 0xf4, 0x0, {}, [@common=@ttl={{0x24, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}}}}, {{@uncond, 0x0, 0x70, 0x94}, @REJECT={0x24, 'REJECT\x00'}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vlan0\x00', 'vlan0\x00'}, 0x0, 0x70, 0x94}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x30c) 23:21:10 executing program 4: r0 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$unlink(0x9, r0, r1) 23:21:10 executing program 1: r0 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 23:21:10 executing program 0: ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000000)) mprotect(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 23:21:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000200)={'ipvlan0\x00', @ifru_addrs=@nl=@unspec}) 23:21:10 executing program 4: r0 = socket(0x11, 0x2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00', r0) 23:21:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0xb}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) socket$inet_udplite(0x2, 0x2, 0x88) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) connect$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x2}, 0x6e) 23:21:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0) 23:21:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0xb}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffd48) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) socket$inet_udplite(0x2, 0x2, 0x88) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x1718370e1c40cd28}, 0x11ffffff6) connect$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x2}, 0x6e) 23:21:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x3, 0x0, &(0x7f0000000040)) 23:21:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000040)=0x1b, 0x4) 23:21:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000000)={'macsec0\x00', @ifru_flags}) 23:21:10 executing program 5: sigaltstack(&(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 23:21:11 executing program 5: socketpair$unix(0x1, 0x400000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000528000)=[{0x6, 0x0, 0x0, 0x401}]}, 0x8) close(r0) 23:21:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x4e21, @multicast1}, 0x10) getpeername$inet(r0, 0x0, &(0x7f0000001080)) 23:21:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000180)={'filter\x00'}, &(0x7f00000000c0)=0xaa) 23:21:11 executing program 3: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 23:21:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001440)=@security={'security\x00', 0xe, 0x4, 0x12d4, 0xffffffff, 0xdc, 0xdc, 0x0, 0xffffffff, 0xffffffff, 0x13e0, 0x13e0, 0x13e0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0x70, 0x94}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@ip={@rand_addr, @empty, 0x0, 0x0, 'sit0\x00', 'wg0\x00'}, 0x0, 0x10a0, 0x10fc, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x1330) 23:21:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_flags}) 23:21:11 executing program 4: r0 = openat$rtc(0xffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4004700e, 0x0) 23:21:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f00000000c0), 0x4) 23:21:11 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@buf) 23:21:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000000)={'batadv_slave_0\x00', @ifru_flags}) 23:21:11 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@setlink={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'syz_tun\x00'}, @IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}]}]}, 0x50}}, 0x0) 23:21:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1}, &(0x7f0000000040)=0x20) 23:21:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000300)=""/209, 0xd1}], 0x1, 0x0, 0x0) 23:21:11 executing program 1: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) pipe(&(0x7f0000000140)) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 23:21:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 23:21:11 executing program 5: add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=';', 0x1, 0xffffffffffffffff) 23:21:11 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb7d, 0x200, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:21:11 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x81000200) r2 = epoll_create(0x800) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) inotify_rm_watch(r0, r1) epoll_pwait(r2, &(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) 23:21:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000040)="c26bbc6ef22cf5990e748bac210892bceb12476cc205de2d920a8be6ad033350623d40ee9d8f8e828edb8c44489644ebf8618e091dccf28846889b10451a0846e30ae98693e6a0ef3ddea169c7b6c2f6ac739e011b6ad473143422875bc47206a7a2b7c970fca5b57b28fbc3158029e70095b850fba2406b990d8028274f7b790dde9b361a81b544ba12e34a3631165a5a752da7b43c192f5c8fa64f83c32f1b7ac5c33ccc4744ca", 0xa8) 23:21:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000300)={'vlan0\x00', @ifru_flags}) 23:21:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 23:21:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@local, @random="7fd89d73f203", @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x4}, @md5sig={0x13, 0x12, "abfd704addac5acbf61e6a6238b8e618"}, @mptcp=@remove_addr={0x1e, 0x10, 0x0, 0x0, "13b13200f7046e7ac95e086406"}, @exp_fastopen={0xfe, 0xc, 0xf989, "fe8f8fae03b966ce"}, @md5sig={0x13, 0x12, "2c415bb5e4f1459ea69359b5512663cc"}]}}}}}}}, 0x0) 23:21:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @remote}, {}, 0x28, {0x2, 0x0, @private}, 'batadv_slave_0\x00'}) 23:21:11 executing program 4: mq_unlink(&(0x7f0000000300)='%)\xa8\\/\'}*-(:\x00') 23:21:11 executing program 3: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 23:21:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x6, @broadcast, 0x0, 0x4, 'sh\x00'}, {@empty}}, 0x44) 23:21:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000000), 0x0) clock_gettime(0x7, &(0x7f0000000040)) 23:21:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a8, 0x0, 0x0, 0x128, 0x1ec, 0x0, 0x314, 0x314, 0x314, 0x314, 0x314, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x94}, @TTL={0x24, 'TTL\x00'}}, {{@ip={@multicast1, @empty, 0x0, 0x0, '\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x94}, @TTL={0x24, 'TTL\x00'}}, {{@uncond, 0x0, 0x9c, 0xc4, 0x0, {}, [@common=@addrtype={{0x2c, 'addrtype\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0xffc}}}, {{@ip={@broadcast, @dev, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1\x00'}, 0x0, 0x70, 0x94}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x70, 0x94}, @TTL={0x24, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x404) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r1, 0x0, 0x0) [ 1225.052737] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:21:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000013c0)=@nat={'nat\x00', 0x19, 0x5, 0x98a, [0x20000300, 0x0, 0x0, 0x20000dc8, 0x20000df8], 0x0, 0x0, &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x0, 0x0, 0x0, 'erspan0\x00', 'wlan1\x00', 'veth0_to_hsr\x00', 'veth1_vlan\x00', @link_local, [], @random="80662d3e0313", [], 0x8ae, 0x8ae, 0x8fa, [@among={{'among\x00', 0x0, 0x81c}, {{@offset, @offset, 0x0, {[0x7]}}}}], [], @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0xa0e) 23:21:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x10001, {{0x2, 0x0, @multicast1}}}, 0x84) 23:21:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={0x0, &(0x7f0000000980)=""/218, 0x0, 0xda}, 0x20) 23:21:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x3d8, 0x218, 0x10c, 0x218, 0x2f8, 0x2f8, 0x2f8, 0x4, 0x0, {[{{@arp={@remote, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_1\x00', 'macsec0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@remote, @local, @loopback}}}, {{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="45e31fa26913", @mac=@broadcast, @empty}}}, {{@arp={@rand_addr, @empty, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6gre0\x00', 'netdevsim0\x00'}, 0xbc, 0xe0}, @unspec=@STANDARD={0x24}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x424) 23:21:12 executing program 3: getitimer(0x2, &(0x7f00000006c0)) 23:21:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r0, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0xffffffffffffffc3) 23:21:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@setlink={0x44, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'syz_tun\x00'}, @IFLA_AF_SPEC={0x10, 0x1a, 0x0, 0x1, [@AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}]}]}]}, 0x44}}, 0x0) 23:21:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={0x0, 0x18}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x8}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x681}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 23:21:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000003400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) 23:21:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x1, &(0x7f0000004240)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x3, 0x6, 0x4}], &(0x7f0000004280)='syzkaller\x00', 0xfff, 0x89, &(0x7f00000042c0)=""/137, 0x1f00, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000043c0)={0x0, 0x5, 0x400, 0x1}, 0x10}, 0x78) 23:21:12 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f00000037c0)="bc", 0x1}, {&(0x7f00000038c0)="85", 0x1}, {&(0x7f00000039c0)=',', 0x1}], 0x3}, 0x0) 23:21:12 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 23:21:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) 23:21:12 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000003cc0)=[{0x0}, {&(0x7f00000038c0)="85", 0x1}], 0x2, &(0x7f0000003d40)=[{0x10}], 0x10}, 0x0) 23:21:12 executing program 0: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:21:12 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x1, &(0x7f0000004240)=@raw=[@jmp], &(0x7f0000004280)='syzkaller\x00', 0x0, 0x89, &(0x7f00000042c0)=""/137, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:21:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 23:21:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x1, &(0x7f0000004240)=@raw=[@jmp], &(0x7f0000004280)='syzkaller\x00', 0xfff, 0x89, &(0x7f00000042c0)=""/137, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000004380), 0x8, 0x10, 0x0}, 0x78) 23:21:12 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000003600), 0x8) 23:21:12 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='memory.swap.current\x00', 0x0, 0x0) 23:21:12 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000011c0), 0xc) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)) [ 1225.801886] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 23:21:12 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000041c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:21:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1225.859671] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 23:21:12 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000003700)) 23:21:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x1, &(0x7f0000004240)=@raw=[@jmp={0x5, 0x0, 0x3, 0x4, 0x3, 0x6, 0x4}], &(0x7f0000004280)='syzkaller\x00', 0xfff, 0x89, &(0x7f00000042c0)=""/137, 0x1f00, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000043c0)={0x0, 0x5, 0x400, 0x1}, 0x10}, 0x78) 23:21:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x1, &(0x7f0000004240)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x3, 0x6, 0x4}], &(0x7f0000004280)='syzkaller\x00', 0xfff, 0x89, &(0x7f00000042c0)=""/137, 0x1f00, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000043c0)={0x0, 0x5, 0x400, 0x1}, 0x10}, 0x78) openat$cgroup(0xffffffffffffffff, &(0x7f0000005f00)='syz1\x00', 0x200002, 0x0) 23:21:13 executing program 2: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x41, 0x0, 0x0, 0x0}, 0x20) 23:21:13 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x1, &(0x7f0000004240)=@raw=[@jmp], &(0x7f0000004280)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:21:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c, 0x4010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x80, 0x1, 0x0, 0x9, 0x401, 0x10001, 0x800}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:21:13 executing program 5: bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0}, 0x38) 23:21:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x1, &(0x7f0000004240)=@raw=[@jmp={0x5, 0x0, 0x3, 0x4, 0x3, 0x6, 0x4}], &(0x7f0000004280)='syzkaller\x00', 0xfff, 0x89, &(0x7f00000042c0)=""/137, 0x1f00, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000043c0)={0x0, 0x5, 0x400, 0x1}, 0x10}, 0x78) openat$cgroup(0xffffffffffffffff, &(0x7f0000005f00)='syz1\x00', 0x200002, 0x0) [ 1226.049477] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 23:21:13 executing program 2: bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001200)={0x0, &(0x7f0000001000)=""/53, 0x0, &(0x7f00000010c0), 0x5}, 0x38) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000041c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:21:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 23:21:13 executing program 1: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={0x0}, 0x10) [ 1226.159397] bridge0: port 2(bridge_slave_1) entered disabled state [ 1226.166164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.196117] device bridge0 entered promiscuous mode [ 1226.505653] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1226.516315] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1226.528414] bridge0: port 2(bridge_slave_1) entered blocking state [ 1226.535973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1226.544542] bridge0: port 1(bridge_slave_0) entered blocking state [ 1226.552251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1226.562197] device bridge0 left promiscuous mode [ 1226.594655] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1226.609618] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1226.633719] bridge0: port 2(bridge_slave_1) entered disabled state [ 1226.640724] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.648047] device bridge0 entered promiscuous mode 23:21:13 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000012c0)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 23:21:13 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000003cc0)=[{0x0}, {&(0x7f00000038c0)="85", 0x1}, {&(0x7f00000039c0)=',', 0x1}], 0x3, &(0x7f0000003d40)=[{0x28, 0x0, 0x0, "4b070646c6b5df6d2b13d5c46c3622e8bc"}], 0x28}, 0x4000040) 23:21:13 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:21:13 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000100)=@raw=[@map_val], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:21:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:21:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000640)={0x5, 0x70, 0x0, 0x2, 0x0, 0x7f, 0x0, 0xfffffffffffffff9, 0x6, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x71d, 0x3}, 0x0, 0x80000000, 0x9, 0x1, 0x2ae}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) 23:21:13 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001540)={0x0, 0x0, 0x8}, 0x10) [ 1226.828533] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 23:21:13 executing program 5: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:21:13 executing program 1: perf_event_open(&(0x7f0000001340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:21:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000640)={0x5, 0x70, 0x40, 0x2, 0x0, 0x7f, 0x0, 0xfffffffffffffff9, 0x6, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x71d, 0x3}, 0x0, 0x80000000, 0x9, 0x1, 0x2ae}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x32, 0x0, 0x7) socket$kcm(0x10, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c, 0x4010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x80, 0x1, 0x0, 0x9, 0x401, 0x10001, 0x800}, 0xffffffffffffffff, 0x7, r2, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) [ 1226.879975] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 23:21:14 executing program 4: socket$kcm(0xa, 0x3, 0x11) r0 = socket$kcm(0x10, 0x2, 0x4) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="48000000140081fb7059ae08060c04000aff0f03000004000011000000006fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) [ 1226.954601] bridge0: port 2(bridge_slave_1) entered blocking state [ 1226.961563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1226.969701] bridge0: port 1(bridge_slave_0) entered blocking state [ 1226.976586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1226.990263] device bridge0 left promiscuous mode 23:21:14 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f00000038c0)="85", 0x1}], 0x1}, 0x0) [ 1227.044025] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1227.061653] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.069606] bridge0: port 1(bridge_slave_0) entered disabled state 23:21:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x0, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 1227.089603] device bridge0 entered promiscuous mode 23:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000100)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1, 0x0, 0x26c0}, 0x4800) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d3524fc60100010400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x2) 23:21:14 executing program 4: perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:21:14 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000002280)='(', &(0x7f0000002380)="96"}, 0x48) [ 1227.818073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.824715] bridge0: port 1(bridge_slave_0) entered disabled state [ 1227.836379] device bridge0 entered promiscuous mode 23:21:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1227.945099] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1227.955663] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1227.970075] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.977640] bridge0: port 1(bridge_slave_0) entered disabled state [ 1227.984993] device bridge0 entered promiscuous mode [ 1228.206558] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.213139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.219914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.226494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1228.249309] device bridge0 left promiscuous mode [ 1228.256461] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1228.264451] bridge0: port 2(bridge_slave_1) entered disabled state [ 1228.271371] bridge0: port 1(bridge_slave_0) entered disabled state [ 1228.278409] device bridge0 entered promiscuous mode 23:21:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000640)={0x5, 0x70, 0x0, 0x2, 0x0, 0x7f, 0x0, 0xfffffffffffffff9, 0x6, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x71d, 0x3}, 0x0, 0x80000000, 0x9, 0x1, 0x2ae}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) 23:21:15 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x400100, 0x0) 23:21:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x0, 0x1, &(0x7f0000004240)=@raw=[@jmp], &(0x7f0000004280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000004380), 0x8, 0x10, 0x0}, 0x78) 23:21:15 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f00000037c0)="bc", 0x1}, {&(0x7f00000038c0)="85", 0x1}, {&(0x7f00000039c0)=',', 0x1}], 0x3, &(0x7f0000003d40)=[{0x28, 0x0, 0x0, "4b070646c6b5df6d2b13d5c46c3622e8bc"}], 0x28}, 0x4000040) [ 1228.379228] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.386466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.393794] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.400785] bridge0: port 1(bridge_slave_0) entered forwarding state 23:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000640)={0x5, 0x70, 0x0, 0x2, 0x0, 0x7f, 0x0, 0xfffffffffffffff9, 0x6, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x71d, 0x3}, 0x0, 0x80000000, 0x9, 0x1, 0x2ae}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) [ 1228.440859] device bridge0 left promiscuous mode [ 1228.454861] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.461799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.470569] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.477695] bridge0: port 1(bridge_slave_0) entered forwarding state 23:21:15 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003d40)=[{0x28, 0x0, 0x0, "4b070646c6b5df6d2b13d5c46c3622e8bc"}], 0x28}, 0x4000040) [ 1228.542388] device bridge0 left promiscuous mode 23:21:15 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/net/tun\x00', 0x28800, 0x0) [ 1228.572576] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1228.603955] bridge0: port 2(bridge_slave_1) entered disabled state [ 1228.610952] bridge0: port 1(bridge_slave_0) entered disabled state [ 1228.631145] device bridge0 entered promiscuous mode 23:21:15 executing program 4: perf_event_open$cgroup(&(0x7f0000001440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:21:15 executing program 1: perf_event_open$cgroup(&(0x7f0000001440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1228.861530] bridge0: port 2(bridge_slave_1) entered disabled state [ 1228.868700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1228.885065] device bridge0 entered promiscuous mode 23:21:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x1, &(0x7f0000004240)=@raw=[@jmp], &(0x7f0000004280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:21:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:21:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1229.143365] bridge0: port 2(bridge_slave_1) entered blocking state [ 1229.151085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1229.159594] bridge0: port 1(bridge_slave_0) entered blocking state [ 1229.167828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1229.197540] device bridge0 left promiscuous mode [ 1229.216209] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1229.233116] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.239860] bridge0: port 1(bridge_slave_0) entered disabled state [ 1229.259379] device bridge0 entered promiscuous mode 23:21:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000640)={0x5, 0x70, 0x0, 0x2, 0x0, 0x7f, 0x0, 0xfffffffffffffff9, 0x6, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x71d, 0x3}, 0x0, 0x80000000, 0x9, 0x1, 0x2ae}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) 23:21:16 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, 0x0, 0x0) [ 1229.376388] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.383164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1229.399024] device bridge0 entered promiscuous mode 23:21:16 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000003cc0)=[{0x0}, {&(0x7f00000038c0)="85", 0x1}], 0x2}, 0x0) 23:21:16 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, 0x0}, 0x0) [ 1229.771879] bridge0: port 2(bridge_slave_1) entered blocking state [ 1229.779038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1229.787370] bridge0: port 1(bridge_slave_0) entered blocking state [ 1229.794799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1229.806378] device bridge0 left promiscuous mode 23:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000640)={0x5, 0x70, 0x0, 0x2, 0x0, 0x7f, 0x0, 0xfffffffffffffff9, 0x6, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x71d, 0x3}, 0x0, 0x80000000, 0x9, 0x1, 0x2ae}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) 23:21:16 executing program 4: ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) [ 1229.820634] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1229.830514] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.837109] bridge0: port 1(bridge_slave_0) entered disabled state [ 1229.846510] device bridge0 entered promiscuous mode [ 1230.039882] bridge0: port 2(bridge_slave_1) entered blocking state [ 1230.047179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1230.056794] bridge0: port 1(bridge_slave_0) entered blocking state [ 1230.064914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1230.076177] device bridge0 left promiscuous mode [ 1230.087637] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1230.096809] bridge0: port 2(bridge_slave_1) entered disabled state [ 1230.103467] bridge0: port 1(bridge_slave_0) entered disabled state [ 1230.111178] device bridge0 entered promiscuous mode [ 1230.225505] bridge0: port 2(bridge_slave_1) entered blocking state [ 1230.233289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1230.241603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1230.248427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1230.257957] device bridge0 left promiscuous mode [ 1230.273584] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1230.301457] bridge0: port 2(bridge_slave_1) entered disabled state [ 1230.308211] bridge0: port 1(bridge_slave_0) entered disabled state [ 1230.316389] device bridge0 entered promiscuous mode 23:21:17 executing program 2: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) 23:21:17 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003d40)=[{0x28, 0x0, 0x0, "4b070646c6b5df6d2b13d5c46c3622e8bc"}], 0x28}, 0x0) 23:21:17 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x4]}, 0x2}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x4e24, 0x0, @local={0xfe, 0x80, [0x0, 0x4]}, 0x2}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000004f80)={&(0x7f0000001900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003a80)=[{&(0x7f0000001980)="44e8765f13cfbded6ffd6622ce4c4b3e15fddaeafeae857f714b1d0844021b8bd22cd638ee12f973da19acd65724730ec55a0ee9d08e1405b3a32f2a0da6e18dca50328e045a8f6156e3129184637233aba592817c0b4f81a6dbd7c13b846750ed698ae632ca49d6896f0be2efd3f64643e66d34d297f19df32499fbfcd6f1db5000d05566a6ad7d3e2cafaa204f8fcc209113344022eb39a824384ca0bf9fbbbbae6db24e6e10275fa6", 0xaa}, {0x0}, {&(0x7f0000002a80)}], 0x3, 0x0, 0x1490}, 0x40000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x4]}}, 0x80, &(0x7f0000000700)}, 0x0) 23:21:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000640)={0x5, 0x70, 0x0, 0x2, 0x0, 0x7f, 0x0, 0xfffffffffffffff9, 0x6, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x71d, 0x3}, 0x0, 0x80000000, 0x9, 0x1, 0x2ae}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) [ 1230.427138] bridge0: port 2(bridge_slave_1) entered blocking state [ 1230.433728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1230.440531] bridge0: port 1(bridge_slave_0) entered blocking state [ 1230.447221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1230.460730] device bridge0 left promiscuous mode [ 1230.489146] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1230.511792] bridge0: port 2(bridge_slave_1) entered blocking state [ 1230.518911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1230.526943] bridge0: port 1(bridge_slave_0) entered blocking state [ 1230.534164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1230.577473] device bridge0 left promiscuous mode [ 1230.619759] bridge0: port 2(bridge_slave_1) entered disabled state [ 1230.627356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1230.653860] device bridge0 entered promiscuous mode 23:21:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:21:17 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003d40)=[{0x10}], 0x10}, 0x0) 23:21:17 executing program 2: perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) [ 1230.794965] bridge0: port 2(bridge_slave_1) entered disabled state [ 1230.802300] bridge0: port 1(bridge_slave_0) entered disabled state [ 1230.811750] device bridge0 entered promiscuous mode 23:21:17 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x1, &(0x7f0000004240)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}], &(0x7f0000004280)='syzkaller\x00', 0xfff, 0x89, &(0x7f00000042c0)=""/137, 0x1f00, 0x5, [], 0x0, 0x0, r0, 0x8, &(0x7f0000004380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000043c0)={0x0, 0x5, 0x400, 0x1}, 0x10}, 0x78) 23:21:17 executing program 2: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000035c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 23:21:18 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001580)={@map, 0xffffffffffffffff, 0x10}, 0x10) 23:21:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000640)={0x5, 0x70, 0x0, 0x2, 0x0, 0x7f, 0x0, 0xfffffffffffffff9, 0x6, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x71d, 0x3}, 0x0, 0x80000000, 0x9, 0x1, 0x2ae}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) 23:21:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f00000037c0)="bc", 0x1}, {&(0x7f00000038c0)="85", 0x1}, {&(0x7f00000039c0)=',', 0x1}], 0x3, &(0x7f0000003d40)=[{0x10}], 0x10}, 0x0) 23:21:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) [ 1231.245584] nla_parse: 11 callbacks suppressed [ 1231.245627] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1231.276501] bridge0: port 2(bridge_slave_1) entered blocking state [ 1231.283719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1231.292074] bridge0: port 1(bridge_slave_0) entered blocking state [ 1231.299043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1231.318752] device bridge0 left promiscuous mode [ 1231.337882] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1231.358596] bridge0: port 2(bridge_slave_1) entered disabled state [ 1231.365418] bridge0: port 1(bridge_slave_0) entered disabled state [ 1231.393738] device bridge0 entered promiscuous mode 23:21:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0x2, &(0x7f0000000140)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:21:18 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000003cc0)=[{0x0}, {0x0}, {&(0x7f00000039c0)=',', 0x1}], 0x3}, 0x0) [ 1231.704150] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1231.720072] bridge0: port 2(bridge_slave_1) entered blocking state [ 1231.726845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1231.733877] bridge0: port 1(bridge_slave_0) entered blocking state [ 1231.740705] bridge0: port 1(bridge_slave_0) entered forwarding state 23:21:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000003400)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x40) [ 1231.750109] device bridge0 left promiscuous mode [ 1231.765367] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1231.774118] bridge0: port 2(bridge_slave_1) entered disabled state [ 1231.781339] bridge0: port 1(bridge_slave_0) entered disabled state [ 1231.797000] device bridge0 entered promiscuous mode 23:21:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:21:18 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)) 23:21:18 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002280)='(', &(0x7f0000002380)}, 0x48) 23:21:18 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00'}, 0x10) [ 1231.936179] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1231.945567] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1231.969118] bridge0: port 2(bridge_slave_1) entered blocking state [ 1231.976108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1231.984037] bridge0: port 1(bridge_slave_0) entered blocking state [ 1231.990796] bridge0: port 1(bridge_slave_0) entered forwarding state 23:21:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 23:21:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x143}, 0x48) [ 1232.086945] device bridge0 left promiscuous mode [ 1232.113024] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1232.144373] bridge0: port 2(bridge_slave_1) entered disabled state [ 1232.151205] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.176222] device bridge0 entered promiscuous mode 23:21:19 executing program 0: perf_event_open(&(0x7f0000001340)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:21:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x32, 0x0, 0x7) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c, 0x4010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x80, 0x1, 0x0, 0x9, 0x401, 0x10001, 0x800}, 0xffffffffffffffff, 0x7, r4, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) [ 1232.339428] bridge0: port 2(bridge_slave_1) entered disabled state [ 1232.346168] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.385016] device bridge0 entered promiscuous mode [ 1232.403563] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1232.426869] bridge0: port 2(bridge_slave_1) entered blocking state 23:21:19 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/time_for_children\x00') 23:21:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002280)=@bpf_tracing={0x1a, 0x1, &(0x7f00000004c0)=@raw=[@ldst], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:21:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 1232.434220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1232.442251] bridge0: port 1(bridge_slave_0) entered blocking state [ 1232.449435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1232.460917] device bridge0 left promiscuous mode [ 1232.486900] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1232.517386] bridge0: port 2(bridge_slave_1) entered disabled state [ 1232.524107] bridge0: port 1(bridge_slave_0) entered disabled state 23:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x32, 0x0, 0x7) r3 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) socketpair(0x23, 0x5, 0x0, &(0x7f0000000040)) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c, 0x4010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x80, 0x1, 0x0, 0x9, 0x401, 0x10001, 0x800}, 0xffffffffffffffff, 0x7, r4, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) [ 1232.552724] device bridge0 entered promiscuous mode [ 1232.777413] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1232.788974] bridge0: port 2(bridge_slave_1) entered blocking state [ 1232.795938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1232.803955] bridge0: port 1(bridge_slave_0) entered blocking state [ 1232.810764] bridge0: port 1(bridge_slave_0) entered forwarding state 23:21:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:21:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000001f80)={&(0x7f0000002000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0x6}}}, 0x24}}, 0x0) [ 1232.823478] device bridge0 left promiscuous mode [ 1232.836599] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1232.846943] bridge0: port 2(bridge_slave_1) entered disabled state [ 1232.854004] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.865134] device bridge0 entered promiscuous mode [ 1233.040443] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1233.050794] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.057501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.071693] device bridge0 entered promiscuous mode [ 1233.312264] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1233.324794] bridge0: port 2(bridge_slave_1) entered blocking state [ 1233.331759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1233.339941] bridge0: port 1(bridge_slave_0) entered blocking state [ 1233.346941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1233.357177] device bridge0 left promiscuous mode [ 1233.363708] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1233.372038] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.379244] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.390757] device bridge0 entered promiscuous mode [ 1233.507890] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1233.518451] bridge0: port 2(bridge_slave_1) entered blocking state [ 1233.524961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1233.532019] bridge0: port 1(bridge_slave_0) entered blocking state [ 1233.538611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1233.545666] device bridge0 left promiscuous mode [ 1233.553995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1233.561969] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1233.582603] bridge0: port 2(bridge_slave_1) entered blocking state [ 1233.590464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1233.598231] bridge0: port 1(bridge_slave_0) entered blocking state 23:21:20 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/net/tun\x00', 0x0, 0x0) [ 1233.605219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1233.620069] device bridge0 left promiscuous mode [ 1233.632024] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1233.653537] bridge0: port 2(bridge_slave_1) entered blocking state [ 1233.660289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1233.667040] bridge0: port 1(bridge_slave_0) entered blocking state [ 1233.673519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1233.685731] device bridge0 left promiscuous mode [ 1233.692314] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1233.703331] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.710150] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.724852] device bridge0 entered promiscuous mode [ 1233.842662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.849528] bridge0: port 1(bridge_slave_0) entered disabled state 23:21:20 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) [ 1233.885147] device bridge0 entered promiscuous mode 23:21:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 23:21:21 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)) [ 1234.064294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1234.070938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1234.077736] bridge0: port 1(bridge_slave_0) entered blocking state [ 1234.084266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1234.100468] device bridge0 left promiscuous mode 23:21:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c, 0x4010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x80, 0x1, 0x0, 0x9, 0x401, 0x10001, 0x800}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xb) [ 1234.118809] bridge0: port 2(bridge_slave_1) entered disabled state [ 1234.125716] bridge0: port 1(bridge_slave_0) entered disabled state [ 1234.148081] device bridge0 entered promiscuous mode 23:21:21 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004180)={&(0x7f0000003740)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000003cc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000003d40)=[{0x28, 0x0, 0x0, "4b070646c6b5df6d2b13d5c46c3622e8bc"}], 0x28}, 0x4000040) [ 1234.390059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1234.408355] bridge0: port 2(bridge_slave_1) entered blocking state [ 1234.415459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1234.422548] bridge0: port 1(bridge_slave_0) entered blocking state [ 1234.429217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1234.436696] device bridge0 left promiscuous mode [ 1234.442758] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1234.449828] bridge0: port 2(bridge_slave_1) entered disabled state [ 1234.457071] bridge0: port 1(bridge_slave_0) entered disabled state 23:21:21 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f0000000300)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}, 0x80) [ 1234.482648] device bridge0 entered promiscuous mode [ 1234.669197] bridge0: port 2(bridge_slave_1) entered blocking state [ 1234.676128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1234.684315] bridge0: port 1(bridge_slave_0) entered blocking state [ 1234.691928] bridge0: port 1(bridge_slave_0) entered forwarding state 23:21:21 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000132000/0x2000)=nil, 0x2000) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) 23:21:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:21:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x22) [ 1234.723523] device bridge0 left promiscuous mode [ 1234.734909] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1234.761435] bridge0: port 2(bridge_slave_1) entered disabled state [ 1234.768050] bridge0: port 1(bridge_slave_0) entered disabled state [ 1234.784343] device bridge0 entered promiscuous mode 23:21:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8954, &(0x7f0000000200)={'ip6erspan0\x00', @ifru_addrs=@can}) 23:21:21 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40040, 0x0) 23:21:22 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) 23:21:22 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') setns(r0, 0x0) 23:21:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) [ 1235.086503] bridge0: port 2(bridge_slave_1) entered blocking state [ 1235.093113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1235.099930] bridge0: port 1(bridge_slave_0) entered blocking state [ 1235.107167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1235.119424] device bridge0 left promiscuous mode [ 1235.132421] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1235.162218] bridge0: port 2(bridge_slave_1) entered blocking state [ 1235.169260] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1235.177477] bridge0: port 1(bridge_slave_0) entered blocking state [ 1235.184259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1235.204801] device bridge0 left promiscuous mode 23:21:22 executing program 4: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) [ 1235.248130] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1235.294147] bridge0: port 2(bridge_slave_1) entered disabled state [ 1235.300750] bridge0: port 1(bridge_slave_0) entered disabled state [ 1235.341829] device bridge0 entered promiscuous mode 23:21:22 executing program 1: keyctl$link(0x2, 0x0, 0xfffffffffffffffe) 23:21:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000700)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1235.497744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1235.507055] bridge0: port 2(bridge_slave_1) entered blocking state [ 1235.514365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1235.522321] bridge0: port 1(bridge_slave_0) entered blocking state [ 1235.529408] bridge0: port 1(bridge_slave_0) entered forwarding state 23:21:22 executing program 2: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x80}, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x5]}, 0x8}) 23:21:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@gettaction={0x18, 0x32, 0x1, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 23:21:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 1235.545901] device bridge0 left promiscuous mode 23:21:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0xf, r1, 0x0, 0x0, 0x0) [ 1235.607810] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 23:21:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) [ 1235.648768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1235.655650] bridge0: port 1(bridge_slave_0) entered disabled state 23:21:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x890c, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) [ 1235.702590] device bridge0 entered promiscuous mode 23:21:22 executing program 2: timer_create(0x0, 0x0, &(0x7f0000002380)) 23:21:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000007e"], 0x30}}, 0x0) [ 1236.003055] bridge0: port 2(bridge_slave_1) entered blocking state [ 1236.010499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1236.018737] bridge0: port 1(bridge_slave_0) entered blocking state [ 1236.025665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1236.053157] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1236.064696] device bridge0 left promiscuous mode [ 1236.081435] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 23:21:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 23:21:23 executing program 4: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1236.100968] bridge0: port 2(bridge_slave_1) entered disabled state [ 1236.107706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1236.121977] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1236.140489] device bridge0 entered promiscuous mode 23:21:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x8, 0x0, 0x0) 23:21:23 executing program 4: sigaltstack(&(0x7f00005c7000/0x6000)=nil, 0x0) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) 23:21:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 23:21:23 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) [ 1236.429908] nla_parse: 12 callbacks suppressed [ 1236.429952] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 23:21:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88], 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x8982, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x32, 0x0, 0x7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) socketpair(0x23, 0x5, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:21:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@broadcast, @rand_addr, @dev}, 0xc) [ 1236.492715] bridge0: port 2(bridge_slave_1) entered blocking state [ 1236.499741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1236.508352] bridge0: port 1(bridge_slave_0) entered blocking state [ 1236.515310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1236.531113] device bridge0 left promiscuous mode [ 1236.561861] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1236.610695] bridge0: port 2(bridge_slave_1) entered disabled state [ 1236.617416] bridge0: port 1(bridge_slave_0) entered disabled state [ 1236.653697] device bridge0 entered promiscuous mode 23:21:23 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x16) 23:21:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@bridge_setlink={0x20, 0x12, 0xa29}, 0x20}}, 0x0) 23:21:23 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x814}, 0x40) [ 1236.789540] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 23:21:23 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000002000)=[{&(0x7f00000011c0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00009651"], 0x28}], 0x1, 0x0) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000200)=0x6e) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r2, &(0x7f0000001040)=[{{&(0x7f00000002c0)=@can, 0x80, &(0x7f0000000500)=[{&(0x7f0000002040)="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", 0x1000}, {&(0x7f0000000340)="272e9973797581dc8e307bfe6af8751079993bb753246831931e0b7325e300ad7552b9caa96a00645dbaefcdf7a7a549bd9b1974b171225587c20d303297e42dd116d8dbb539d72ebbb9d49f27f67c092d7798692827666b8ab2c7497b0513e8b0cb327689e480a7374a3215ab98fb1b79054ce52eaad7dbf3ddf68547184a296bfeecdf56a87178170e1d639f9ee3be11307039e565ae2d985c90255097c3cf56a912426c9c299281b5e0af5cece8db20dbd12d99d01355b072c7e9c8a67b16d38c2b69", 0xc4}, {&(0x7f0000000240)="e0de3ab9e775adc8b4dd15365b63f904d2744822cc22f5ff8aa3539441cb6d6fd74ed4f1842c825860e0de79863a371777", 0x31}, {&(0x7f0000000440)="c30d17620fd84c9f895af14af9aa6eef23ab53449b5574abf232159fb9c71df6306c8b678a4004c7374cc188d3926f758bf354b7c880c400e5dbf0c7629ac7929f39db1a04d2bf7465df62e26304b6fcab3a1faa6f0cd5ab050a05dea58f4620e71f47197a1e3eeaa0bdd4fbc9c9ace3139a221da60712fb7ed4326d379a8659aeee8f2ad0c101f1a1f403aac934bc41af", 0x91}], 0x4, &(0x7f0000000540)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x30}}, {{&(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x3, 0x2, 0x4, 0x3, {0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x17}, 0xfffff48c}}}, 0x80, &(0x7f00000006c0), 0x2, &(0x7f0000000700)=[@txtime={{0x18, 0x1, 0x3d, 0x7f}}], 0x18}}, {{&(0x7f0000000740)=@generic={0x22, "e3d29da649247b8be16cd50b458be0955892145af53dc426068fe8d41f09f69bcf92f9c1dca4e8d597cbf18954515693d8e86bda75a2121759318c42ec7347ca6f6d9034ff2da5f29ea2dc953995ddf7796ea45a1464abb1b77fea740b15aa2ca15e1f17ff60d19d25b716ac61ba8d17c020d6585e74b665cc52c75c196d"}, 0x80, &(0x7f0000000900)=[{&(0x7f00000007c0)="fd1d0729c81422da605cc6", 0xb}, {&(0x7f0000000800)="ec538f06df6bc874a0696e26f0bdb2b24263ef6e4243efc568832167d4343c264081d3629b785965", 0x28}, {&(0x7f0000000840)="776944e06c2d4390c74ccc085458d03fc2dd304156f509da96ca6c0fd60ac56ca1975a6c983d91f9330f5f2ff9fb0139da3a79d5f345e90850a2683685c3180b8f30628315814b2db981c1f29f5aaa0670ce853027384649987b3a1b44a98acc3bb116471f9896db9142ff4dfa98ff5e60135dae645057faa7b894b037319284298e2d7198aba8e03f5504f57a5de888ed2792f23a7c423c3a093283972ee9fd7d59ddf77298ad8e", 0xa8}], 0x3, &(0x7f0000000940)=[@txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x73f}}, @txtime={{0x18, 0x1, 0x3d, 0x800}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x101}}, @timestamping={{0x0, 0x1, 0x25, 0xfffffffe}}], 0xa8}}, {{&(0x7f0000000a00)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000a80)="2b6000216104123ea96a0697ca3adc8bc0c4bb3fb492168378da0e32bac8e0f08cd743ca947718e92719ec7c6bf4121ee9d7d39750f684e8480a6475c203e0b111731cb40b6691907a4626756968a0f942", 0x51}, {&(0x7f0000000b00)="b379812f86997bf57aebb095b2b8156750b8a9f486bc3a7bdf820c8ff43a8825351289e8709e24cb74adbba37fd0988e7eff31a8bfb085848ada", 0x3a}, {&(0x7f0000000b40)="ac7942ef0e54dda6c3b8f31ac02bc5c6b51cb1fdb5ce4994d66f27dbcfafe7fbb33192aa0cbad8b376c4d8228c61b59413f06d392f895dee358986f2a2cbbff83f3663554cd67d41075acc6a4dbe7da92a0ac74992c1b1e422a0535b976a0d6ad193ba43", 0x64}, {&(0x7f0000000bc0)="c91f91c77763b00e2a15b4c969f7df24ceaf93d943abf3be03e3e0ea956c19bc6b4bc925aeca9bae29e67cd2ec164da39a38fae58b183c9755592a0a27ade4a0a60e59f87a89fc3be7fdfaaef7adbd68f170f6", 0x53}, {&(0x7f0000003040)="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", 0x1000}, {&(0x7f0000000c40)="29e6", 0x2}, {&(0x7f0000000c80)="93ed9ae846d618c77a095f12b39babdc05e39f98f6780868ae521f64ca8c92cddf7a458ad435421b6f16387375b149017936176919181a", 0x33}, {&(0x7f0000000cc0)="104afe8fc62c24a8c760c6d34fd15f9d19fe6d85bbbaf9f05eca6b930738a7b2a5289e92c85d2f96a3a7dbddb265fb845aef3a55ce8b127c18e74e761bfe3acd79d3061f802bf9484640e18bd95f69e1aebfa89c09b0cf9f370b33a74bcc502218f0105666a5807a1c6bbc2b852c5464778c0bce8dcffd8e1d635fa5f802c87c97d1774f393d759a35d75f48c4397479cef826eec8f003af282b1c7094628814d935b34d07fa830cb5cbf62b9a9c0bdd32e4ac52613cf142bfb103c0a186187a15c4b28ac9ba6a59207e813f0a8b0637abaf1726759f9afdb0e98f0fe8fadf76e15cf78c0a48b93967ebd975bcfdba7732b5", 0xf2}, {&(0x7f0000000dc0)="4434bc0513f2881d6e513d2780a12e207317429dd45e1322af0c4f8773ebf07b74eea1b758806a42e35377221500bba8089bdf9bf358c6fc4a1a95e0334bf2c25799aa0e391a36b736d9c0bd9ee4febaabdd3a20e802afba83b86c414c0552fe31f420c683829a28873f69d5a2b22f85f19b703ce36073ecaf5b856b45dc322404bea16e37aa63f3122ffcff4db456913b30ad07bc2f555c0df24e9bd85f2b064f4743ddcb3848d911f851f2e2b1431dce2f56029258bc31266b949ff5dd250e35e382f36f6694224e45338b0a5368d6a1d5a3ee78aa38df55f3c3b83f57b42aeeaac28454", 0xe5}], 0x9, &(0x7f0000000f80)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x90}}], 0x4, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x800) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8912, &(0x7f0000000040)={'wg0\x00'}) 23:21:23 executing program 3: syz_mount_image$fuse(&(0x7f0000000100)='fuse\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000001140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id'}}) [ 1236.836905] bridge0: port 2(bridge_slave_1) entered blocking state [ 1236.844016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1236.852488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1236.859438] bridge0: port 1(bridge_slave_0) entered forwarding state 23:21:23 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x45) recvmmsg(r2, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000440)=""/245, 0xf5}, {&(0x7f0000000300)=""/170, 0x9cb}, {&(0x7f0000000e00)=""/96, 0x8}, {&(0x7f0000000600)=""/204, 0x208}, {&(0x7f0000001040)=""/4096, 0x1011}], 0x5}}], 0x14, 0x0, 0x0) 23:21:23 executing program 5: keyctl$link(0xc, 0x0, 0xfffffffffffffffe) 23:21:24 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mremap(&(0x7f00001b7000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000342000/0x3000)=nil) [ 1236.973597] device bridge0 left promiscuous mode [ 1237.029186] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1237.062804] bridge0: port 2(bridge_slave_1) entered disabled state [ 1237.069603] bridge0: port 1(bridge_slave_0) entered disabled state [ 1237.103916] device bridge0 entered promiscuous mode 23:21:24 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0xffff80fe, @nfc, @ipx={0x4, 0x0, 0x0, "daec904c07c8"}, @l2}) 23:21:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') read$FUSE(r0, 0x0, 0x0) 23:21:24 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000006b80)='/proc/timer_list\x00', 0x0, 0x0) 23:21:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@bridge_setlink={0x20, 0x12, 0xa29}, 0x20}}, 0x0) 23:21:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=[@hoplimit_2292={{0x14}}], 0x18}, 0x0) 23:21:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae01, 0x4c) 23:21:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x5}}], 0x18}, 0x0) 23:21:24 executing program 0: waitid(0x3, 0xffffffffffffffff, 0x0, 0x8, 0x0) 23:21:24 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 23:21:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@bridge_setlink={0x20, 0x12, 0xa29}, 0x20}}, 0x0) 23:21:24 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) socket$unix(0x1, 0x4, 0x0) 23:21:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) getpeername$inet(r2, 0x0, 0x0) 23:21:24 executing program 5: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) mlock(&(0x7f00006f0000/0x1000)=nil, 0x1000) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x0) msync(&(0x7f000029c000/0x2000)=nil, 0x2000, 0x0) 23:21:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@bridge_setlink={0x20, 0x12, 0xa29}, 0x20}}, 0x0) 23:21:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind(r0, 0x0, 0x0) 23:21:24 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) setrlimit(0xf00, &(0x7f0000000040)) 23:21:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x100}}], 0x1, 0x0) 23:21:24 executing program 1: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 23:21:24 executing program 5: syz_mount_image$fuse(&(0x7f0000000200)='fuse\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[@ANYBLOB=',group_i']) 23:21:24 executing program 4: ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 23:21:24 executing program 0: mlock(&(0x7f0000132000/0x400000)=nil, 0x400000) 23:21:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'tunl0\x00', @ifru_addrs=@nfc}) 23:21:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) recvfrom(r2, &(0x7f0000001a40)=""/114, 0x72, 0x161, 0x0, 0x0) 23:21:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x18, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_setup(0x2e, &(0x7f0000000400)=0x0) io_submit(r1, 0x2, &(0x7f00000055c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f00000012c0)}]) 23:21:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) recvfrom(r2, &(0x7f0000001a40)=""/114, 0x72, 0x161, 0x0, 0x0) 23:21:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="a05da0ae6f60bf66c9d48fda45dd395e56cf79c7facb35f0b89b079ff46ca75585410e6ddf12046b30b58ace7adc029c274240751f0f36fe91b1e31624d8b26b", 0x40}], 0x1}, 0x0) 23:21:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, 0x12f}, 0x40) 23:21:25 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed}, 0xe) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0) 23:21:25 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/4096, 0x1000) 23:21:25 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000080)=ANY=[]) 23:21:25 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) recvfrom(r2, &(0x7f0000001a40)=""/114, 0x72, 0x161, 0x0, 0x0) 23:21:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000a00)=[@dontfrag={{0x14}}], 0x18}, 0x0) 23:21:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040)='wireguard\x00', 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x14, r1, 0x1}, 0x14}}, 0x0) 23:21:25 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind(r0, &(0x7f0000000080)=@l2tp={0xa}, 0x80) 23:21:25 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000001b40)='net/dev_mcast\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, r2, 0x0, 0x20000000001000d8) 23:21:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') read$FUSE(r0, 0x0, 0x0) 23:21:25 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) recvfrom(r2, &(0x7f0000001a40)=""/114, 0x72, 0x161, 0x0, 0x0) 23:21:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x40049409, 0x4c) 23:21:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0, 0xfffffeb5}], 0x1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x32, &(0x7f0000000f00), 0x4) 23:21:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x1, @link_local}, 0x2, {0x2, 0x0, @loopback}, 'bridge_slave_1\x00'}) 23:21:25 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="b4", 0x1, 0x0, 0x0, 0x0) [ 1238.873752] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:21:25 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) 23:21:25 executing program 3: socketpair(0x1, 0x3, 0x7b7c, &(0x7f0000000040)) 23:21:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:25 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000001b40)='net/dev_mcast\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, r2, 0x0, 0x20000000001000d8) 23:21:25 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8912, &(0x7f0000000040)={'wg2\x00'}) 23:21:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x398, 0x0, 0x0, 0x228, 0x0, 0x228, 0x300, 0x300, 0x300, 0x300, 0x300, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x93, 0x0, 0x41, 0x0, 0x0, 0x5, 0x40, 0x4}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "dae7bbe9998a260a8f00a30e54d356de8911e05d607ed2184b8a7d2f9d2e"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3f8) 23:21:26 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x500) 23:21:26 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x16}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) 23:21:26 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f00000018c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 23:21:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}], 0x18}, 0x0) 23:21:26 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0xb, r1, r3, r0, 0x0) [ 1239.291884] audit: type=1804 audit(1616109686.274:345): pid=2010 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir107251413/syzkaller.KlDR7u/804/cgroup.controllers" dev="sda1" ino=15764 res=1 23:21:26 executing program 3: bpf$MAP_CREATE(0xe, &(0x7f0000000000), 0x40) 23:21:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0xb, r1, r2, r0, 0x0) 23:21:26 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000001b40)='net/dev_mcast\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, r2, 0x0, 0x20000000001000d8) 23:21:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty}}) 23:21:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 23:21:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') read$FUSE(r0, 0x0, 0x0) 23:21:26 executing program 4: bpf$MAP_CREATE(0xc, &(0x7f0000000000), 0x40) 23:21:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, 0x0, 0x0) 23:21:26 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/timers\x00', 0x0, 0x0) 23:21:26 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)="5500000018007f5f14fe01b2a49b90930206040200101f01041614", 0x1b}, {&(0x7f0000000280)="e910a6dd82f12fd649d3a433fb98d565b21fb26014894eaf5e247a3d09d1cf196151c0f34ec13e54e6b19fb7c259d165b6ba3a34cbaaeb89634b", 0x3a}], 0x2, 0x0, 0x0, 0xf000000}, 0x0) socket$inet6(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 23:21:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) 23:21:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:26 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000001b40)='net/dev_mcast\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, r2, 0x0, 0x20000000001000d8) 23:21:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty}}) [ 1239.968594] audit: type=1804 audit(1616109686.944:346): pid=2060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir107251413/syzkaller.KlDR7u/805/cgroup.controllers" dev="sda1" ino=15523 res=1 23:21:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[@dontfrag={{0x14}}, @rthdr={{0x18}}], 0x30}, 0x0) 23:21:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="a05da0ae6f60bf66c9d48fda45dd395e56cf79c7facb35f0b89b079ff46ca75585410e6ddf12046b30b58ace7adc029c274240751f0f36fe91b1e31624d8b26b9222c68a786e4d", 0x47}], 0x1}, 0x0) [ 1240.089990] ieee802154 phy0 wpan0: encryption failed: -22 [ 1240.095637] ieee802154 phy1 wpan1: encryption failed: -22 23:21:27 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[@dstopts_2292={{0x28, 0x29, 0x4, {0x0, 0x1, [], [@padn={0x1, 0x1, [0x0]}, @ra, @generic]}}}], 0x28}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@dstopts_2292={{0x18}}], 0x18}}], 0x2, 0x0) 23:21:27 executing program 2: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x3000020) 23:21:27 executing program 4: keyctl$KEYCTL_MOVE(0x5, 0x0, 0x0, 0x0, 0x0) [ 1240.362928] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:21:27 executing program 3: keyctl$link(0x1a, 0x0, 0xfffffffffffffffe) 23:21:27 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x541b, &(0x7f0000000040)={'wg0\x00'}) 23:21:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000180)=0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x0) close(r3) [ 1240.629844] audit: type=1804 audit(1616109687.614:347): pid=2102 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir107251413/syzkaller.KlDR7u/806/cgroup.controllers" dev="sda1" ino=15892 res=1 23:21:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000180)=0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x0) close(r3) 23:21:27 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x27, 0x303, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe10e004000632b77fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) 23:21:27 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000180)=0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x0) close(r3) 23:21:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000022c0)=@newtfilter={0x24, 0x2c, 0x11, 0x0, 0x0, {0x2}}, 0x24}}, 0x0) 23:21:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:28 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000180)=0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x0) close(r3) 23:21:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 23:21:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000180)=0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x0) close(r3) [ 1241.303693] audit: type=1804 audit(1616109688.284:348): pid=2145 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir107251413/syzkaller.KlDR7u/807/cgroup.controllers" dev="sda1" ino=15969 res=1 23:21:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000180)=0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x0) close(r3) 23:21:28 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000040)={@remote, @remote}, &(0x7f0000000180)=0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x0) close(r3) 23:21:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x43}}], 0x18}, 0x0) 23:21:28 executing program 0: socketpair(0x28, 0x0, 0x0, &(0x7f0000000280)) 23:21:28 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x27, 0x303, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe10e004000632b77fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7", &(0x7f0000000100)}, 0x28) 23:21:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000004e80)={0x1, &(0x7f0000004e40)=[{}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) 23:21:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x11, r1, 0x0, 0x0, 0x0) 23:21:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) 23:21:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8916, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @mcast2}}) 23:21:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8918, 0x0) 23:21:29 executing program 2: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x80}, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 23:21:29 executing program 3: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) 23:21:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x0, 0x0) 23:21:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x2}}], 0x18}, 0x0) 23:21:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@dontfrag={{0x14}}, @rthdr_2292={{0x18}}], 0x30}, 0x0) 23:21:29 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x27, 0x303, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe10e004000632b77fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) 23:21:29 executing program 3: fork() waitid(0x0, 0x0, 0x0, 0x2, 0x0) fork() 23:21:29 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x281, 0x0) write$vga_arbiter(r0, &(0x7f0000000140)=@other={'trylock', ' ', 'mem'}, 0xc) 23:21:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:29 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) unlink(&(0x7f00000017c0)='./file0\x00') 23:21:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x0, 0x0) 23:21:29 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x281, 0x0) write$vga_arbiter(r0, &(0x7f0000000140)=@other={'trylock', ' ', 'mem'}, 0xc) 23:21:29 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x27, 0x303, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe10e004000632b77fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) 23:21:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x0, 0x0) 23:21:30 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x281, 0x0) write$vga_arbiter(r0, &(0x7f0000000140)=@other={'trylock', ' ', 'mem'}, 0xc) 23:21:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) 23:21:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x0, 0x0) 23:21:30 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x281, 0x0) write$vga_arbiter(r0, &(0x7f0000000140)=@other={'trylock', ' ', 'mem'}, 0xc) 23:21:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="a05da0ae6f60bf66c9d48fda45dd395e56cf79c7facb35f0b89b079ff46ca75585410e6ddf12046b30b58ace7adc029c274240751f0f36", 0x37}], 0x1}, 0x0) 23:21:30 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) 23:21:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xc, 0x0, 0x0) 23:21:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x2, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18}}], 0x18}, 0x0) 23:21:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x42) 23:21:30 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x4000) 23:21:30 executing program 5: request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0) 23:21:30 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f000000f200)={""/16185}, 0x4000) 23:21:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0xb, r0, 0x0, 0x0, 0x0) 23:21:31 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x4000) 23:21:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000100)='fuse\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x2c, 0xffffffffffffffff}, 0x2c, {'group_id'}}) 23:21:31 executing program 0: accept4(0xffffffffffffffff, 0x0, 0x0, 0x40000) 23:21:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x4030582a, 0x0) 23:21:31 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) getpeername$inet(r0, 0x0, 0x0) 23:21:31 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x4000) [ 1244.241894] audit: type=1804 audit(1616109691.224:349): pid=2292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir788043214/syzkaller.Ri0lzl/875/cgroup.controllers" dev="sda1" ino=14112 res=1 23:21:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x27) 23:21:31 executing program 5: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@generic={0x0, "a808902bb9598212ba13eb803723c9d3a3676a8bf171f8bc298bb125adf064cf6b510cc37adf24dae4edfb72af4dba7e3bf175f489d653cd43466c6fef7da6ee56d9ac820d92c43818d3851d61052f9158919728dd9db8f16a72cfd1d69c55d13b42fa26e1119c100061d44c87bb2d1aa2540178064d8df549d6da7b40f6"}, 0x80) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, &(0x7f0000000040)={'wg0\x00'}) 23:21:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)=[{}, {0x0, 0x45}]}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, &(0x7f0000000040)={'wg2\x00'}) 23:21:31 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x0) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) mmap$xdp(&(0x7f00005c7000/0x3000)=nil, 0x3000, 0x0, 0x4012, r0, 0x0) 23:21:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) 23:21:31 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x4000) 23:21:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='personality\x00') read$FUSE(r0, 0x0, 0x0) 23:21:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r3, 0xae03, 0x0) 23:21:31 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) munlock(&(0x7f00005c8000/0x2000)=nil, 0x2000) 23:21:31 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) getsockname$inet(r0, 0x0, 0x0) 23:21:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x10, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:32 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @nfc, @ipx={0x4, 0x0, 0x0, "daec904c07c8"}, @l2, 0x0, 0x0, 0x0, 0x2}) 23:21:32 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 23:21:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@dev, @local, @dev, 0x0, 0x5549}) 23:21:32 executing program 1: r0 = creat(0x0, 0x104) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x398, 0x0, 0x0, 0x228, 0x0, 0x228, 0x300, 0x300, 0x300, 0x300, 0x300, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x0, 0x41, 0x0, 0x0, 0x5, 0x40}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "dae7bbe9998a260a8f00a30e54d356de8911e05d607ed2184b8a7d2f9d2e"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3f8) 23:21:32 executing program 0: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:21:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@hoplimit_2292={{0x14}}, @dstopts_2292={{0x18}}], 0x30}, 0x804) 23:21:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000080)={'syztnl1\x00', 0x0}) 23:21:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev2(r2, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0x14) 23:21:32 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x2, 0x40, 0x0, 0xfffffffffffffc55) [ 1245.283181] xt_hashlimit: invalid rate 23:21:32 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}, 0x0) 23:21:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) 23:21:32 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000240)='%', 0x1, r0) 23:21:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev2(r2, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0x14) 23:21:32 executing program 1: r0 = creat(0x0, 0x104) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x398, 0x0, 0x0, 0x228, 0x0, 0x228, 0x300, 0x300, 0x300, 0x300, 0x300, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x0, 0x41, 0x0, 0x0, 0x5, 0x40}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "dae7bbe9998a260a8f00a30e54d356de8911e05d607ed2184b8a7d2f9d2e"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3f8) 23:21:32 executing program 2: sendmsg$inet6(0xffffffffffffffff, 0x0, 0xf7ffff7f) 23:21:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xb, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:32 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="b4", 0x20000001, 0x0, 0x0, 0x0) [ 1245.612254] xt_hashlimit: invalid rate 23:21:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x3c) 23:21:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev2(r2, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0x14) 23:21:32 executing program 1: r0 = creat(0x0, 0x104) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x398, 0x0, 0x0, 0x228, 0x0, 0x228, 0x300, 0x300, 0x300, 0x300, 0x300, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x0, 0x41, 0x0, 0x0, 0x5, 0x40}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "dae7bbe9998a260a8f00a30e54d356de8911e05d607ed2184b8a7d2f9d2e"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3f8) 23:21:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @private1, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@hopopts_2292={{0x18}}, @hoplimit={{0x14}}], 0x30}, 0x0) [ 1245.843109] xt_hashlimit: invalid rate 23:21:33 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_open_dev$usbfs(&(0x7f00000037c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 23:21:33 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="b4", 0x20000001, 0x0, 0x0, 0x0) 23:21:33 executing program 2: socket$key(0xf, 0x3, 0x2) 23:21:33 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev2(r2, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0x14) 23:21:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @nfc, @ipx={0x4, 0x0, 0x0, "daec904c07c8"}, @l2={0x1f, 0x0, @any, 0x0, 0x2}}) 23:21:33 executing program 1: r0 = creat(0x0, 0x104) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x398, 0x0, 0x0, 0x228, 0x0, 0x228, 0x300, 0x300, 0x300, 0x300, 0x300, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x0, 0x41, 0x0, 0x0, 0x5, 0x40}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "dae7bbe9998a260a8f00a30e54d356de8911e05d607ed2184b8a7d2f9d2e"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3f8) 23:21:33 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="b4", 0x20000001, 0x0, 0x0, 0x0) 23:21:33 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 23:21:33 executing program 0: syz_genetlink_get_family_id$fou(&(0x7f0000000600)='fou\x00', 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) [ 1246.512553] xt_hashlimit: invalid rate 23:21:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a0, &(0x7f0000000040)={'wg0\x00'}) 23:21:33 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_open_dev$usbfs(&(0x7f00000037c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 23:21:33 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="b4", 0x20000001, 0x0, 0x0, 0x0) 23:21:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) 23:21:33 executing program 0: bpf$MAP_CREATE(0x17, 0x0, 0x0) 23:21:33 executing program 4: r0 = socket(0x11, 0x2, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001300)=[{&(0x7f0000000240)="f0d214e227193bb16d4214d3a8acf52a2cf72f5cf42aa950e0bf590924be3429ecdc87cbd93a182b48d20cf2a5c74bc1c7badcfc1591e0bcd5adcd4fc04e1f0c6ad93ce0983ec886b426573799991f556524e51a3b998d58ee0cad94b91759e0cf77a9cf64bdaa790ec5a7ac37e54faddcc02a181ac251ee654d801a3a116cca68ea7a530b1c65df8a297af1b2a4f9f9447a926ce9b7f80713f73ec8dc71f163c8a722d0ae31c356e5b752d029e138f2e03df91989312cf0f99815ef915b329194d15528f725081e19c5ed3cfd79fddddcb83b4499a5b5bf38c8c7b8bda66ea38d8b9434237d86bbbed1b9c7450b533409d9c6f0a3025ac81ed566ff56d74f9d8a9753f7ef646d4084d09b7cd0625bea36c65290a529155d14dbd24080a2b131919682fcfd72dac41e6295a6f95a4fafaecf59182a265aafb11b86725c6679dd1e6e7e87f058ee4650a444e2459c645f5081899f9b7e8e0db4a33a7c715133e3509800cd3dc630c7a34baf112b2cf91195239a716bd34618b16c521d4a5f8bcb43f6f199e31c5e501ac2bfed7e9b080f8c57d1fc4f7eaedfa23db333cfeba4924374123d14a26dcdc0293569f06923cfd7c898cbe51d634a10bb23b427f5f6b6da0ac877e7fa60539c72f7179a92ab674a4470bfe5a77a720731877b059d2fac083c38152a5592a352a203523f0d6ad8499e45ea49a8e6222e971af110c0a3ef2e08252e1ce654e649314210d4e8691400e2256c49023bc48ac23011359c8e0b239c9c181131107f947e878ca6e4a8c33df191019258907613749067713ac041c94ae05f2dce4dadd5b99d4ebd0ce0819878af258bd4a1610d591f29d9c36854326564b1b8d72ffb50c977e329677c5fdb80f4f4f8e7161186fd55d4cf6056e6ed1cee74ab83fe8febbd5ff7e5952052851ff2072bc4d833fde8127f3b9da872e8c8376a3a18046206fa744ccdef400ab6298f4ed7a2fa5cda6dbdee804a4af2478098fc889096710fb8685b9976a2d2760423e33a39e8c5a01d8c3228065d1352c4977cdc4b87059b82233a20ff9774269aa921cd225da59a906bdfc3317132806c6ef31b0dfecbda806744d348b2832c2821ae5f48d74d7e5f20d36b0779fee5550b1d915220558a77fe2d8a327a6bc45ee035bec7f148485c3745331488354fd126b57e19144e47cc3cd673c46ec91a903b836287966c833cb9f3260ca96a18ec6f9f89f9152532a9d5ef8b34ae9e1b85f509dace3543d6230af885db990df65e7cf266d2ac35731ca44e2f1f0f05b54634199a0533afaa7130bc5e5f733ec103a7e25f190a29d842ca571b9ffcf8f47267d3e8c926b9064077e69e00d291a2b6f6cc14086a9ea78a7ee91b795bdf16e2f103cfcfa848de61d5b2ba2541e6c9679e0600988a0388600a0bce3116ea6a23c1e7fa8a2a29424fb5f225c591dae839d8bec33af01dcecff95b48e60148fb183753117f570f86fe348e3ac9fe8d8ef5a008a8bf9b73bf7577ba66176fc4425615f0c40cc5278712f304cbbadf82a7fc740b8a506a43eb4bae76539decd2d494bb6f5e643b42e662be4c9616b49cd13fbe5769b66de09dc54c8edc8f20aa4d3e58b9a1c5bea0e863bb0b8c1a40d23bb79d073beb4ec9c25eb0b0dc2e9fd6ff885f0f4bf648bfaa04841588ef61d85095a661e8e8b3096948c0edc83fe00cb7702933b7007b1883f76ca41a83f42f5e592420aa17c476827d23a14e1a60ae1197aaeeb42b19f19bfd5e4e49726048fb04569d87ce5e94053e59bb48da78c705bb6ec9cad8cc87eb9adf46a876a4feb3a28efcffffed3024b79c82e166cf47037788af61be96cb8a8bbe7aa592d848c89415c0e3a7f166c7ef59ce05dd9c7591b1d9da4291853b914ca89fc1c42ac189d9d2f13b4b1261a9aa4c1304622e061d511d412ee8f604d4562a72a8c4cf6d3e4288d77d5c2f15c34ea69194489ae0c5f2ee1ea04003eb40be99b796558d06ff585bea0bc21b4817e691463e068504301cec5cce2d349626f9a3e3c46563eea7253ddd295f45908be6daf7daf7b87b698b1909e87e543645233ce6fa72a9f8f82710b32ccc26aec159e7f7d9c9220fb45362ffefe05b9b998c76a97ce728560c8e8911c160618d0d3f4b8d6e5877168f2f1ef0a2bb7e090536fab81abc1939caad9ecee3d502a4cab6f2fbe5a56f99711b7676c525b8f3719c9d3a83b4f771fefa449cb7cb5c3e550974d9f40171ef2aba98e58f8cefcfc89da113f446c365dd30b7d972cc940e9c9b5776d1d7af95e54ac0cd7c667555b05f9d72d8953d173ff50fe17c1f05c4d4ceb27358a90ccb8575969956d46bb613f8dce15b93d528d665fb97dd3bb4c361b77900cf051ad05d15491ff6d1eaa35a0beb5c001d892d01a52777ad39701fe1d570f680b137388363959b4164a22cf24a32700e8e938abb28e382bf565ff2fc91b118761b1cf73750e0b279eb6c0e117c647311199b5dc6525b9eeb3daa1efa4a3c53d71bbd27df6b9dd4080a1f0b919155d47ccf31c7ac369106d856c4e851c524c3f7fbc8d0aaf4e055cf5eed869b375a0c7fdad4cdf2963c218e8a9c3a71953dec55e3630808a9e9f9c8d1bcf73bb357bd4c544a6cf480571fb3ee20f50d2158eaee6c0ec9204cf982b23e5480a97be1ffec75d662387347c0cc6997990c4ce27fd8a8dd418ec8a5709f12ea904f9348580531f2d55f9b367940473b33a56dc7e1bef70867d9b03f3e286377450f09573bc4fac7a3a93007856b0932934da71eefbe2e23a67e1fe7555fa33e45760c4718bb501e757a0b3a12f8717a657a99dcc7b9a86f597da94683c3c3419fb09549476e04211c4f923aec74943484f5a2c2a279961ecc79b2ae29cb1fd3d0179d2d00b83b0a654c1c48c6334e9aabf26b882fcc354a9a53c5407a852d8d0a0b8eac1e35a1f4c0f7baa70d22f50caedf822e33d6a1e9882154962b01ea2536c6e73ebad37d3a6f9792baab59295ec9378741c615c36ada9c1271fada32f8262b08d973a608a6d876be1adc57b5e31f369b77c7a55b0e487dafea0ce5845d0936aa866534cf19dc3cd3645d3bfb513f9ac46d3d5977201c90f780c606301703d04781bb28815de6979189b20abd7113e1667f28127390acee6afd83ebe05ee2f3eb19f785fc45639c8d0063746567131329809fc1c71ba4eb10a491e664288e5d577a375a8fd046be784024bf7886a2562a95184d88d47f3198b231bd5e388f90e0fec3c003c42072a12a5c633c3fb5a58794adb2f0738dc8e2b88a2bd57a8cf624dc97be5fc006c23748ffd0e41f899bbda6233a51982b10d86c21f88f031e2b44f6404d71ffb0db7cf38168ab081f80033b16d591a419db3466c3b57935ef5b8d5cbe95468b16102d184a519f1a4aec50cbd16e6ed950cd5714e93b443b7e5690a8f6a1792901deb9d0789681bfce9e7397db4997d8228525cc2d2ef8f38cf3f281b992a3e4149de81734b42725252529317028364a7d3291133bf15f3d1a8fc3666b9de8d6c820352ac9ec837a6b2ed56af29f633dd42b41fe9f765ef5b7a65c8186d0b49d7b3f218ae5d82297cefb2439382f63f6aaf6fdb6698737bd95abad655a13142c7eaf381e1d3aeff28536aed0bdf2e3a9423f59f689ffa181b6c1ec9f4ffdd065ee9803f4b1fca63bf425d2eb953f2db93daf09bb0bc31184d01ee50514275b6ee7bd4bc5e0b62c13f9c0eee670d76c3e79638aa6bea13c7c1fbdad03f351dff6f13624fb9a114f24275be4bc28f4e0e1dfdc51a79e77dea925d8986f0172632ed10b756436df48f31a0185c47e988b024a5675e5d263bcb785b6dd2d6a5984076fb540d126568cc12b1434b8977cfc7d80270fe2f266ad4d512dff9cd778ce0fc13c4d6d6bf1d47e74b6078a0bc7ac3153780a42104e498cb016b53b9ec1b93f79a8909e3a9bc79e8f7b1399dafdf1d12d72c0e89115f02568167de061b98c4a8e3c7fb0c126f94b9ffc2bd677cea3c11be8adbc09fe99d2e57050a655b9384745d03fbc6bee67b495df428c6117197451fe3d94db152434984c9f0a4624107477b5f02d7b8349b4dafab4fe529dfcda9f806f7c823feebba3d9bfb1a6739b8cb01a8de609fae1f122a7525ab6e3c56cbfd4efae26708bdb1b4c387b7b88b4e6a31624507782966745e27fbca9530a8e3faa77965dc6e3661f5ef8c511f0983cddc649f74d7e6bdc3788f1f303fbfe9ee2a41b03869f8c7c1cb871f34dde08138eae3f59349280f739a1f9d00b46521fdc185137a9b02c53d4055efd2c85f1ad100d4883d9920d182a24ad9185369adcc49f75bdcd328e549181fdcd2c7ee1066f158af49db83b154b9147ed0998040a7c1f50bba1206414da6263977360a46ce1511376a88d790500badb4245b8f70c7387cedf33cae41e5bf160c85d15b594b47389236dfdadf330bd85d739aa1bbb6a756c59b5b241df6088600e1167ca7a8ad89e8db7723174f252aa7ca38a1cddcb091116e5aa7c97b30f46a2588649b305c3c8a0abcdab8001ed38cdbba941f195acd22f14890767862ae893e305c1f24b8a6f584c8ad9dc270d45689d7d2e119f686c07988afa8b9ae58ce545e2f2f0d5069fb515d5c4b4d8007599e72ebfe7f0df55ded1123ba6d0d211fa426f75232a517d8816f1a447545ac9dc96b8883b0385f21be6964a93ce085118eb0a3d0a9105709b145af3b969c53a944a29fb622d7ef87c5b4a058c424a2e1f65d7a8c546ca8dbbac759fd8cae1ec6f5f2092f8e4ec9424c5f219291bb6f67a04fff871b50326087afa68749a6f8b3bc5", 0xd4c}], 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000018c0)=[{&(0x7f0000000f80)=@abs, 0x6e, &(0x7f0000001680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}], 0x1, 0x0) 23:21:33 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000600)='fou\x00', 0xffffffffffffffff) 23:21:33 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_open_dev$usbfs(&(0x7f00000037c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 23:21:33 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, r0) 23:21:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x8}, 0x0, &(0x7f0000000240)={0x77359400}, 0x0) 23:21:34 executing program 3: request_key(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0) 23:21:34 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_open_dev$usbfs(&(0x7f00000037c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 23:21:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, 0x0, 0x0) 23:21:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000180)={'sit0\x00', 0x0}) 23:21:34 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 23:21:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x8}, 0x0, &(0x7f0000000240)={0x77359400}, 0x0) 23:21:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$pptp(r0, 0x0, 0xc00) 23:21:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000006700)={&(0x7f0000006600)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000066c0)={&(0x7f0000006640)={0x14}, 0x14}}, 0x0) 23:21:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x31, 0x0, 0x0) 23:21:34 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 23:21:34 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000100)) 23:21:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x42, 0x0) 23:21:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x7, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:34 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x2, @remote}}, 0x1e) 23:21:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x398, 0x0, 0x0, 0x228, 0x0, 0x228, 0x300, 0x300, 0x300, 0x300, 0x300, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x93, 0x0, 0x41, 0x0, 0x0, 0x5, 0x40, 0x4}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "dae7bbe9998a260a8f00a30e54d356de8911e05d607ed2184b8a7d2f9d2e"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3f8) 23:21:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000006700)={&(0x7f0000006600)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000066c0)={0x0}}, 0x0) 23:21:35 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 23:21:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x8}, 0x0, &(0x7f0000000240)={0x77359400}, 0x0) 23:21:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x3b}}], 0x18}, 0x0) 23:21:35 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, 0xfffffffffffffffd) 23:21:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x12, 0x0, 0x0) 23:21:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:21:35 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) 23:21:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, 0x0, 0x0) 23:21:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 23:21:35 executing program 4: syz_mount_image$fuse(&(0x7f0000000200)='fuse\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[]) 23:21:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 23:21:35 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 23:21:35 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 23:21:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x8}, 0x0, &(0x7f0000000240)={0x77359400}, 0x0) 23:21:35 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000200)={'ip6erspan0\x00', @ifru_addrs=@can}) 23:21:35 executing program 5: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@appraise='appraise'}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}]}}) 23:21:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x2, 0x0, 0x0, r0, 0x0) 23:21:35 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) 23:21:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x95) 23:21:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@hoplimit_2292={{0x14}}, @dstopts_2292={{0x18}}], 0x30}, 0x0) 23:21:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=ANY=[@ANYBLOB="180000000000000029"], 0x18}, 0x0) 23:21:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@private1}) 23:21:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x23, 0x0, 0x0) 23:21:36 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/slabinfo\x00', 0x0, 0x0) 23:21:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) 23:21:36 executing program 3: keyctl$link(0x11, 0x0, 0xfffffffffffffffe) 23:21:36 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x2802) write$tcp_mem(r0, &(0x7f0000000140), 0xfe32) 23:21:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20008001) 23:21:36 executing program 0: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@appraise='appraise'}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}]}}) 23:21:36 executing program 2: openat$rtc(0xffffffffffffff9c, 0x0, 0x400100, 0x0) 23:21:36 executing program 3: socketpair(0x11, 0x3, 0x0, &(0x7f0000000800)) 23:21:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x10, 0x0, 0x0) 23:21:36 executing program 4: timer_create(0x0, &(0x7f0000002340)={0x0, 0x0, 0xfaa046f20e7b70d3, @thr={0x0, 0x0}}, 0x0) 23:21:36 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8919, 0x0) 23:21:36 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/stat\x00', 0x0, 0x0) 23:21:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x6}]}) 23:21:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) 23:21:36 executing program 2: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000010c0)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0}, 0x68) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 23:21:37 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x2802) write$tcp_mem(r0, &(0x7f0000000140), 0xfe32) 23:21:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x4, r1, 0x0, 0x0, 0x0) 23:21:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000006700)={0x0, 0x0, &(0x7f00000066c0)={0x0}}, 0x0) 23:21:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x24) 23:21:37 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[]) 23:21:37 executing program 2: syz_mount_image$fuse(&(0x7f0000000200)='fuse\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[@ANYBLOB=',']) 23:21:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1d, r1, 0x0, r0, 0x0) 23:21:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x26, 0x0, 0x0) 23:21:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}) 23:21:37 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @nfc, @ipx={0x4, 0x0, 0x0, "daec904c07c8"}, @l2, 0x0, 0x0, 0x0, 0xb00}) 23:21:37 executing program 2: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x80}, 0x0, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 23:21:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x8}}], 0x18}, 0x0) 23:21:37 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x2802) write$tcp_mem(r0, &(0x7f0000000140), 0xfe32) 23:21:37 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000036c0)='./file0/file0\x00', 0x0) 23:21:37 executing program 1: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) munlock(&(0x7f0000358000/0x4000)=nil, 0x4000) 23:21:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) 23:21:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 23:21:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x109801) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 23:21:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:37 executing program 2: mmap$perf(&(0x7f00005c8000/0x3000)=nil, 0x3000, 0x4, 0x82032, 0xffffffffffffffff, 0x0) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) 23:21:37 executing program 0: socket$inet(0x2, 0x2, 0xcc) 23:21:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0xa, 0x400, 0x6, 0x1f}, 0x40) 23:21:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r3, 0xc008ae67, 0x0) 23:21:37 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) ioctl$CHAR_RAW_IOOPT(r0, 0x1279, 0x0) 23:21:38 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x2802) write$tcp_mem(r0, &(0x7f0000000140), 0xfe32) 23:21:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 23:21:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x300, 0x12f}, 0x40) 23:21:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2, 0x0, 0x0) 23:21:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r3, 0xc008ae67, 0x0) 23:21:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a1, &(0x7f0000000040)={'wg0\x00'}) 23:21:38 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="a4"]) 23:21:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 23:21:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0), 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) r3 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) unlinkat(r3, &(0x7f0000001580)='./file0\x00', 0x200) 23:21:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r3, 0xc008ae67, 0x0) 23:21:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$pptp(r0, &(0x7f0000000100)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) 23:21:38 executing program 3: bpf$MAP_CREATE(0xa, &(0x7f0000000000), 0x40) [ 1251.736001] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1251.836307] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:21:38 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_buf(r1, 0x1, 0xd, 0x0, &(0x7f0000000100)) 23:21:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="a05da0ae6f60bf66c9d48fda45dd395e56cf79c7facb35f0b89b079ff46ca75585410e6ddf12046b30b58ace7adc029c274240751f0f36fe91b1e31624d8b26b9222c68a786e4d979fe00461327de2dba396860c37729abc1b8156d4caf30bb9db5983794cfc299d15f8703bf2a66e58415148ecd9df62e6bcf52767b0877f7a7f9aafcf27b3", 0x86}], 0x1}, 0x0) 23:21:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{&(0x7f0000000040)=@l2={0x1f, 0x0, @fixed}, 0x80, 0x0, 0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="200000000000000001"], 0x100}}], 0x1, 0x0) 23:21:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r3, 0xc008ae67, 0x0) 23:21:38 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x10080, 0x0) 23:21:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) bind(r0, &(0x7f0000000000)=@nfc, 0x80) 23:21:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000740)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}, 0x0) 23:21:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa1) 23:21:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000080)) 23:21:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) 23:21:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2}}) 23:21:39 executing program 3: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:21:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000080)) 23:21:39 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000003c0)={0x2020}, 0x2020) 23:21:39 executing program 0: keyctl$link(0x6, 0x0, 0xfffffffffffffffe) 23:21:39 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)=ANY=[]) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id'}}) 23:21:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x11, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:39 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file1\x00') 23:21:39 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000080)) 23:21:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDRT(r0, 0x8941, &(0x7f0000000080)={0x0, @nfc, @ipx={0x4, 0x0, 0x0, "daec904c07c8"}, @l2}) 23:21:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@tclass={{0x14, 0x29, 0x43, 0xffff}}], 0x18}, 0x0) 23:21:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x0, 0x12f}, 0x40) 23:21:39 executing program 0: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ff2000/0xd000)=nil, 0xd000) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 23:21:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18}}], 0x28}, 0x0) 23:21:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000080)) [ 1252.774589] audit: type=1804 audit(1616109699.754:350): pid=2858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir174954859/syzkaller.29vqio/930/cgroup.controllers" dev="sda1" ino=13943 res=1 23:21:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=@security={'security\x00', 0xe, 0x4, 0x2e0, 0xffffffff, 0x0, 0x1e0, 0xe0, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xe0}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "59da5edcfb6f7deb5daa3aca9f41edbc482e26d93e28b079975f8e5d6f728d9149f9b13e9c2816eba29aa7ff0c69834189c9e47112f0df01bac1a156546dbc5a"}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_virt_wifi\x00', 'veth0_to_bond\x00', {}, {}, 0x0, 0x6}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x340) 23:21:39 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x16}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 23:21:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x6192}, 0x0) 23:21:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1253.016578] audit: type=1800 audit(1616109699.994:351): pid=2858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=13943 res=0 23:21:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x4, 0x12f}, 0x40) 23:21:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="a05da0ae6f60bf66c9d48fda45dd395e56cf79c7facb35f0b89b079ff46ca75585410e6ddf12046b30b58ace7adc029c274240751f0f36fe91b1e31624d8b26b9222c68a786e4d979f", 0x49}], 0x1, &(0x7f0000000300)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}], 0x18}, 0x0) 23:21:40 executing program 3: syz_mount_image$fuse(&(0x7f0000000200)='fuse\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[@ANYBLOB='f']) 23:21:40 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @empty}, 0xffe0, 0x0, 0x0, &(0x7f0000000000)=[@dstopts_2292={{0x0, 0x29, 0x4, {0x0, 0x0, [], [@jumbo, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0]}}, @pad1, @pad1]}}}], 0x48}, 0x0) 23:21:40 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="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", 0x5ad}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@dstopts_2292={{0x18}}], 0x18}}], 0x2, 0x0) 23:21:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@dstopts_2292={{0x18}}], 0x18}, 0x0) 23:21:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = inotify_init1(0x0) r3 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_rm_watch(r2, r3) 23:21:40 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004980)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000004900)='fuse\x00', &(0x7f0000004940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}]}}) [ 1253.364863] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:21:40 executing program 1: syz_mount_image$fuse(&(0x7f0000000200)='fuse\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[@ANYBLOB=',group_id=']) 23:21:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0) [ 1253.394690] audit: type=1804 audit(1616109700.374:352): pid=2916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir174954859/syzkaller.29vqio/931/cgroup.controllers" dev="sda1" ino=14091 res=1 23:21:40 executing program 4: keyctl$link(0x14, 0x0, 0xfffffffffffffffe) 23:21:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = inotify_init1(0x0) r3 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_rm_watch(r2, r3) 23:21:40 executing program 0: bpf$MAP_CREATE(0x10, &(0x7f0000000000), 0x40) 23:21:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 23:21:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000001e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2042, 0x0) 23:21:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e20, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x28}, 0x0) 23:21:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = inotify_init1(0x0) r3 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_rm_watch(r2, r3) 23:21:40 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:40 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) 23:21:40 executing program 1: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x80}, 0x0, 0x0) 23:21:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = inotify_init1(0x0) r3 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_rm_watch(r2, r3) 23:21:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000009c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000a00)=[@dontfrag={{0x14}}, @rthdr={{0x18}}], 0x30}, 0x0) 23:21:40 executing program 4: munlock(&(0x7f0000000000/0x2000)=nil, 0x2000) 23:21:40 executing program 0: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) munlock(&(0x7f000043a000/0x1000)=nil, 0x1000) 23:21:40 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x84400, 0x0) [ 1253.898292] audit: type=1804 audit(1616109700.884:353): pid=2964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir174954859/syzkaller.29vqio/932/cgroup.controllers" dev="sda1" ino=14226 res=1 23:21:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2}}) 23:21:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:41 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 23:21:41 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) sendto$packet(r3, &(0x7f0000000040)="110000000000080000000082d95c", 0xe, 0x0, &(0x7f0000000180)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) 23:21:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@dontfrag={{0x14}}], 0x18}, 0x0) 23:21:41 executing program 2: sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f000055e000/0x1000)=nil, 0x1000) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) 23:21:41 executing program 1: clock_getres(0x6, &(0x7f00000023c0)) 23:21:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c, 0x0}, 0x0) 23:21:41 executing program 3: socketpair(0x10, 0x0, 0x200, &(0x7f00000002c0)) 23:21:41 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x32}, 0x0, @in=@broadcast, 0x0, 0x4, 0x0, 0x4}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) [ 1254.294209] audit: type=1804 audit(1616109701.274:354): pid=2994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir174954859/syzkaller.29vqio/933/cgroup.controllers" dev="sda1" ino=14309 res=1 23:21:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000006700)={0x0, 0x0, &(0x7f00000066c0)={&(0x7f0000006640)={0x14}, 0x14}}, 0x0) 23:21:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0xc020662a, &(0x7f0000000200)) 23:21:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r3, 0x4020aeb2, &(0x7f0000000040)) 23:21:41 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x5411, &(0x7f0000000200)={'ip6erspan0\x00', @ifru_addrs=@can}) 23:21:41 executing program 2: timer_create(0x0, &(0x7f0000002340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) [ 1254.513232] audit: type=1804 audit(1616109701.494:355): pid=3014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir257345894/syzkaller.T1DmtZ/1022/cgroup.controllers" dev="sda1" ino=14182 res=1 23:21:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x6, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89a3, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:41 executing program 3: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) msync(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x3) 23:21:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYBLOB="a4"]) 23:21:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r3, 0x4020aeb2, &(0x7f0000000040)) 23:21:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000980)={'batadv_slave_1\x00'}) 23:21:41 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f00002ba000/0x2000)=nil, 0x2000, 0x200000f, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) getdents(r2, 0x0, 0x0) 23:21:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 23:21:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 23:21:42 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r3, 0x4020aeb2, &(0x7f0000000040)) 23:21:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000000)=""/192, 0xc0) 23:21:42 executing program 1: syz_emit_ethernet(0x4f, &(0x7f0000000080), 0x0) 23:21:42 executing program 5: request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) 23:21:42 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) 23:21:42 executing program 1: add_key(&(0x7f0000000300)='asymmetric\x00', 0x0, &(0x7f0000000380)="84", 0x1, 0xffffffffffffffff) [ 1255.180691] audit: type=1804 audit(1616109702.164:356): pid=3060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir195557256/syzkaller.FhWp2H/894/cgroup.controllers" dev="sda1" ino=14226 res=1 23:21:42 executing program 4: read$FUSE(0xffffffffffffffff, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 23:21:42 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r3, 0x4020aeb2, &(0x7f0000000040)) 23:21:42 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)) 23:21:42 executing program 3: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x5]}, 0x8}) 23:21:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000200)={'ip6erspan0\x00', @ifru_addrs=@can}) 23:21:42 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 23:21:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 23:21:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18}}], 0xf}, 0x0) 23:21:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=ANY=[@ANYBLOB="180002"], 0x18}, 0x0) 23:21:42 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8982, 0x0) 23:21:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="b4", 0x1, 0x4000000, 0x0, 0x0) 23:21:42 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, 0x0, 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0xa}, 0x40) 23:21:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 23:21:42 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 1255.964886] audit: type=1326 audit(1616109702.944:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3135 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 23:21:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086604, &(0x7f0000000200)) 23:21:43 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f0000000000), 0x40) 23:21:43 executing program 2: fork() fork() r0 = getpgrp(0xffffffffffffffff) waitid(0x1, r0, 0x0, 0x4, 0x0) 23:21:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="b4", 0x1, 0x4000000, 0x0, 0x0) 23:21:43 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) inotify_rm_watch(r0, 0x0) 23:21:43 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, 0x0) [ 1256.559946] audit: type=1804 audit(1616109703.544:358): pid=3161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir107251413/syzkaller.KlDR7u/857/cgroup.controllers" dev="sda1" ino=14565 res=1 23:21:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x8f) 23:21:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="b4", 0x1, 0x4000000, 0x0, 0x0) [ 1256.607723] EXT4-fs warning (device sda1): ext4_ioctl:814: Setting inode version is not supported with metadata_csum enabled. 23:21:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@dev, @local, @dev}) 23:21:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$binfmt_script(r0, &(0x7f0000001780)=ANY=[@ANYBLOB], 0xed) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0), 0x8) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_int(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x443000033) 23:21:43 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, 0x0) 23:21:43 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, 0x0, 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="b4", 0x1, 0x4000000, 0x0, 0x0) 23:21:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x28, 0x0, 0x0) 23:21:43 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f00001b7000/0x3000)=nil, &(0x7f000048b000/0x4000)=nil, &(0x7f000008d000/0x3000)=nil, &(0x7f00004d4000/0x4000)=nil, &(0x7f0000256000/0x2000)=nil, &(0x7f00002ea000/0x2000)=nil, &(0x7f0000737000/0x4000)=nil, &(0x7f00000f2000/0x3000)=nil, &(0x7f00001d2000/0x1000)=nil, &(0x7f0000281000/0x4000)=nil, &(0x7f000049d000/0x12000)=nil, 0x0}, 0x68) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ff2000/0xd000)=nil, 0xd000) 23:21:43 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, 0x0) 23:21:44 executing program 3: fork() waitid(0x0, 0x0, 0x0, 0x8, 0x0) 23:21:44 executing program 1: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 23:21:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)) 23:21:44 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, 0x0) 23:21:44 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x14, 0x0, r1, r0, 0x0) 23:21:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$binfmt_script(r0, &(0x7f0000001780)=ANY=[@ANYBLOB], 0xed) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0), 0x8) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_int(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x443000033) 23:21:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0}, 0x804) 23:21:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, 0x0, 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x32}}], 0x18}, 0x0) 23:21:44 executing program 1: bpf$MAP_CREATE(0xf, &(0x7f0000000000), 0x40) 23:21:44 executing program 5: unlink(&(0x7f0000000080)='./file0/file0\x00') 23:21:44 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x49600) 23:21:45 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) recvmmsg(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000002440)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x141, 0x0) 23:21:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, r2, 0xfffffffffffffffe) 23:21:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x890b, 0x0) 23:21:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$binfmt_script(r0, &(0x7f0000001780)=ANY=[@ANYBLOB], 0xed) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0), 0x8) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_int(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x443000033) 23:21:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @mcast1, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x18}, 0x0) 23:21:45 executing program 5: setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair(0xb0026705f2221d9b, 0x0, 0x0, &(0x7f0000000740)) 23:21:45 executing program 1: keyctl$restrict_keyring(0x6, 0xfffffffffffffffd, 0x0, 0x0) 23:21:45 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x0) mlock(&(0x7f0000fef000/0xf000)=nil, 0xf000) 23:21:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa2) 23:21:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) 23:21:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') read$FUSE(r0, 0x0, 0xf0ff7f00000000) 23:21:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$binfmt_script(r0, &(0x7f0000001780)=ANY=[@ANYBLOB], 0xed) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0), 0x8) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_int(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x443000033) 23:21:45 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, 0x0, 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:45 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8955, &(0x7f0000000200)={'ip6erspan0\x00', @ifru_addrs=@can}) 23:21:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0x2, 0x0, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:21:45 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x814, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 23:21:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xc, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa4) 23:21:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x1300, 0x12f}, 0x40) 23:21:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000040)) 23:21:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8936, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @mcast2}}) 23:21:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18}}], 0x18}, 0x0) 23:21:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000580)={'sit0\x00', 0x0}) 23:21:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 23:21:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8924, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:46 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f00000018c0)=[{&(0x7f0000000f80)=@abs={0x0, 0x0, 0x4e22}, 0x6e, 0x0}], 0x1, 0x0) 23:21:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x16}]}) 23:21:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2b, 0x0, 0x0) 23:21:46 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x891b, &(0x7f0000000200)={'ip6erspan0\x00', @ifru_addrs=@can}) 23:21:46 executing program 3: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) mmap$xdp(&(0x7f00004c2000/0x4000)=nil, 0x4000, 0x0, 0x100010, r0, 0x0) 23:21:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@hopopts_2292={{0x28, 0x29, 0x36, {0x0, 0x1, [], [@calipso={0x7, 0x8}]}}}], 0x28}, 0x0) [ 1259.782518] audit: type=1326 audit(1616109706.764:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3328 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 23:21:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @local, @ipv4={[], [], @dev}}}) 23:21:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x4b61, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 'Zo\x00\x00\x00\x00\x00\x00\x00\x00\"\x00'}) 23:21:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x64) 23:21:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x11}}], 0x18}, 0x0) 23:21:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8919, &(0x7f0000000200)={'veth0_vlan\x00', @ifru_addrs=@can}) 23:21:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:21:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x19, 0x0, 0x0) 23:21:47 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000372000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mincore(&(0x7f0000373000/0x4000)=nil, 0x4000, 0x0) 23:21:47 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @empty}}) 23:21:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000004e80)={0x0, 0x0}) 23:21:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) close(r2) 23:21:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x380, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:47 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:21:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @mcast2}}) 23:21:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000040)={'veth1_to_bond\x00', @ifru_addrs=@can}) 23:21:47 executing program 4: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x80}, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={[0x5]}, 0x8}) 23:21:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) close(r2) 23:21:47 executing program 3: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@appraise='appraise'}]}}) 23:21:47 executing program 2: add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000180)={0x0, "cfbe49516b659ff29d851389d8d5a940ab0a7d1d62ec770b3984ffda7cc8858b30855596b0e1ab4709372629586e8f80d7293d701cc717bd5be25e1d8953fe2c"}, 0x48, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x890c, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:21:47 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000fee000/0x10000)=nil, 0x10000) 23:21:47 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) connect$packet(r0, 0x0, 0x0) 23:21:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x21, 0x0, 0x0) 23:21:47 executing program 3: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) mlock(&(0x7f00002e9000/0x3000)=nil, 0x3000) 23:21:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) close(r2) 23:21:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000400)=""/4096) 23:21:47 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200)='fuse\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[]) 23:21:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x51) 23:21:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000000200)={'ip6erspan0\x00', @ifru_addrs=@can}) 23:21:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$pptp(r0, 0x0, 0xc) 23:21:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) close(r2) 23:21:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x24, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000200)={'lo\x00', @ifru_addrs=@can}) 23:21:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) 23:21:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:21:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000005480)={0x1, &(0x7f0000005440)=[{0x3, 0x0, 0x0, 0x400}]}) 23:21:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=ANY=[], 0x18}, 0x0) 23:21:47 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/13) 23:21:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x26, 0x0, 0x0) 23:21:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0xffffffff, 0x0, 0x12f}, 0x40) 23:21:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0x2, 0x4e24, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:21:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x25) 23:21:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa8) 23:21:48 executing program 5: waitid(0x3, 0x0, 0x0, 0x8, 0x0) 23:21:48 executing program 4: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) 23:21:48 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) execveat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, 0x0) 23:21:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x27) 23:21:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x1500, 0x12f}, 0x40) 23:21:48 executing program 1: socketpair(0x28, 0x0, 0x2, &(0x7f0000000280)) 23:21:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @private1, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@hoplimit={{0x14}}], 0x18}, 0x0) 23:21:48 executing program 4: socketpair(0x18, 0x0, 0x2, &(0x7f0000000080)) 23:21:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x1d, r0, 0xfffffffffffffffe) 23:21:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) 23:21:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/anycast6\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) unlinkat(r0, &(0x7f0000001580)='./file0\x00', 0x200) 23:21:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000008c0), 0x14) 23:21:48 executing program 4: socketpair(0x18, 0x0, 0x2, &(0x7f0000000080)) 23:21:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x19, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:48 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:21:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x2, 0x40, 0x0, 0x0) 23:21:48 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000004c0)) 23:21:49 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/57764}, 0xe200) 23:21:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8932, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:49 executing program 4: socketpair(0x18, 0x0, 0x2, &(0x7f0000000080)) 23:21:49 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 23:21:49 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@appraise='appraise'}, {@uid_gt={'uid>'}}, {@fowner_lt={'fowner<'}}]}}) 23:21:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @tipc, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @random="7357965b8391"}}) 23:21:49 executing program 0: socket$inet(0x2, 0x2, 0x2) 23:21:49 executing program 3: socket$inet6(0xa, 0x2, 0xee) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x141100, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 23:21:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x37) 23:21:49 executing program 4: socketpair(0x18, 0x0, 0x2, &(0x7f0000000080)) 23:21:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xf, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private1}}) 23:21:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20}, {}]}) 23:21:49 executing program 2: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x3000020) 23:21:49 executing program 4: add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r0, r1) 23:21:49 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$inet(r0, &(0x7f00000019c0)=[{{&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}}], 0x1, 0x0) 23:21:49 executing program 0: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x0) mmap$usbfs(&(0x7f0000097000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 23:21:49 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x1, 0x7f, 0x94, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x5, 0x2}, 0x40) 23:21:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$P9_RREADLINK(r0, &(0x7f0000000240)={0xa, 0x17, 0x0, {0x1, '.'}}, 0xa) 23:21:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x80000) 23:21:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000080)='I', 0x1) 23:21:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x24}}], 0x18}, 0x0) 23:21:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x21) 23:21:49 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind(r0, &(0x7f0000000080)=@l2tp, 0x2) 23:21:49 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x1, 0x7f, 0x94, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x5, 0x2}, 0x40) 23:21:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="a05da0ae6f60bf66c9d48fda45dd395e56cf79c7facb35f0b89b079ff46ca75585410e6ddf12046b30b58ace7adc029c274240751f0f36fe", 0x38}], 0x1}, 0x0) 23:21:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000004340)='fuse\x00', &(0x7f0000004380)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000043c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) 23:21:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'ip6tnl0\x00', 0x0}) 23:21:49 executing program 2: socketpair(0x10, 0x0, 0x0, &(0x7f00000002c0)) 23:21:49 executing program 1: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x0) msync(&(0x7f00003d1000/0x3000)=nil, 0x3000, 0x0) 23:21:49 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x1, 0x7f, 0x94, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x5, 0x2}, 0x40) 23:21:49 executing program 5: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) 23:21:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x7b) 23:21:50 executing program 2: request_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)=']*.\x00', 0x0) 23:21:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000027c0)=ANY=[], 0x100}}], 0x1, 0x0) 23:21:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$link(0x8, r0, 0xfffffffffffffffe) 23:21:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x14, 0x0, 0x0) 23:21:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000a40)={'syztnl0\x00', 0x0}) 23:21:50 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x80000000, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:50 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x1, 0x7f, 0x94, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x5, 0x2}, 0x40) 23:21:50 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 23:21:50 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x0, @remote}}, 0x1e) 23:21:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x3, 0x0, 0x0) 23:21:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x15, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x1800, 0x12f}, 0x40) 23:21:50 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind(r0, &(0x7f0000000080)=@l2tp={0x2, 0x0, @remote}, 0x80) 23:21:50 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) setfsgid(0xee01) 23:21:50 executing program 0: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)=ANY=[@ANYBLOB=',group_id=', @ANYBLOB="a4"]) 23:21:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='C', 0x1, r1) keyctl$link(0x8, r1, r2) 23:21:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 1263.569423] audit: type=1804 audit(1616109710.554:360): pid=3643 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir270037040/syzkaller.ceffYD/819/cgroup.controllers" dev="sda1" ino=14899 res=1 23:21:50 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x80000000, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000880)={0x0, @generic={0x0, "3e2a3c26674670618ac48b873c2a"}, @xdp, @vsock}) 23:21:50 executing program 1: socket(0x2f, 0x0, 0x0) 23:21:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, 0x0) 23:21:50 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:21:50 executing program 5: sigaltstack(&(0x7f0000406000/0x6000)=nil, 0x0) mincore(&(0x7f0000406000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/11) 23:21:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @private2}}) 23:21:50 executing program 1: socket$inet6(0xa, 0x1, 0x8000) 23:21:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8991, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @ipv4={[], [], @dev}}}) 23:21:51 executing program 5: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:21:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000001f80)={&(0x7f0000002000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x0, 0x6}}}, 0x24}}, 0x0) [ 1264.147977] audit: type=1804 audit(1616109711.134:361): pid=3694 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir270037040/syzkaller.ceffYD/820/cgroup.controllers" dev="sda1" ino=14883 res=1 23:21:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x80000000, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:51 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0x4001, 0x0, 0x0) 23:21:51 executing program 3: bpf$MAP_CREATE(0xb, 0x0, 0x0) 23:21:51 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x0) 23:21:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @ipv4={[], [], @dev}}}) 23:21:51 executing program 1: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@appraise='appraise'}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}, {@fsmagic={'fsmagic'}}]}}) 23:21:51 executing program 1: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, r0) 23:21:51 executing program 0: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x80}, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x5]}, 0x8}) 23:21:51 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x15, r0, 0x0, 0x0) 23:21:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 23:21:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @ipv4={[], [], @dev}}}) 23:21:51 executing program 1: fork() waitid(0x0, 0x0, 0x0, 0x4, 0x0) [ 1264.613523] audit: type=1804 audit(1616109711.594:362): pid=3732 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir270037040/syzkaller.ceffYD/821/cgroup.controllers" dev="sda1" ino=14869 res=1 23:21:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x80000000, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000801b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:51 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x20d00, 0x0) syz_fuse_handle_req(r0, &(0x7f00000000c0)="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", 0x2000, &(0x7f0000004d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:21:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x14}, 0x14}, 0x8}, 0x0) 23:21:51 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 23:21:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @ipv4={[], [], @dev}}}) 23:21:51 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 23:21:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) 23:21:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8995, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:51 executing program 3: syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_acct\x00') 23:21:51 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) 23:21:51 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 1265.094252] audit: type=1804 audit(1616109712.074:363): pid=3769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir270037040/syzkaller.ceffYD/822/cgroup.controllers" dev="sda1" ino=15057 res=1 23:21:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x32, &(0x7f0000000f00), 0x4) 23:21:52 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000240)="1c0000001200050f0ce2903e1040000049200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) 23:21:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18}}], 0x20002918}, 0x0) 23:21:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r1, 0x0) 23:21:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{&(0x7f0000000040)=@l2={0x1f, 0x0, @fixed}, 0x80, 0x0, 0x0, &(0x7f00000027c0)=ANY=[], 0x100}}], 0x1, 0x0) 23:21:52 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@subj_type={'subj_type'}}, {@hash='hash'}, {@obj_user={'obj_user'}}]}}) 23:21:52 executing program 3: sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 23:21:52 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 23:21:52 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind(0xffffffffffffffff, &(0x7f0000000080)=@l2tp={0x2, 0x0, @rand_addr, 0x2}, 0x80) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, &(0x7f0000000040)={'wg0\x00'}) 23:21:52 executing program 0: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) 23:21:52 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x80086603, 0x0) 23:21:52 executing program 1: sigaltstack(&(0x7f0000138000/0x1000)=nil, 0x0) mincore(&(0x7f0000358000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/4096) 23:21:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 23:21:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040)='wireguard\x00', 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 23:21:52 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x1, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:21:52 executing program 2: add_key(&(0x7f0000000300)='asymmetric\x00', 0x0, &(0x7f0000000380)="8454", 0x2, 0xffffffffffffffff) [ 1265.796771] audit: type=1804 audit(1616109712.774:364): pid=3811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir174954859/syzkaller.29vqio/980/cgroup.controllers" dev="sda1" ino=15267 res=1 23:21:52 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_cache\x00') 23:21:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}}) 23:21:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000240)="8d", 0x1, 0x0, &(0x7f0000000340)={0x2, 0x4e22, @local}, 0x10) 23:21:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000006700)={&(0x7f0000006600), 0xc, &(0x7f00000066c0)={0x0}}, 0x0) 23:21:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f00007fe000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 23:21:53 executing program 2: add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x6, r0, 0x0, 0x0) 23:21:53 executing program 1: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000406000/0x4000)=nil, &(0x7f0000373000/0x3000)=nil, &(0x7f0000408000/0x2000)=nil, &(0x7f0000409000/0x3000)=nil, &(0x7f0000405000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000409000/0x2000)=nil, &(0x7f0000408000/0x1000)=nil, &(0x7f0000371000/0x4000)=nil, &(0x7f0000407000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000372000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 23:21:53 executing program 5: socket$inet(0x2, 0x1, 0x5a5) 23:21:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000180)) 23:21:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 23:21:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, 0x0, 0x0) 23:21:53 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0xe, r0, 0xfffffffffffffffe) 23:21:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae08, 0x0) 23:21:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000840)=[{{&(0x7f0000000080)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000380)=[{0x28, 0x0, 0x0, "94b9a2ba95ca0899dbea1bf483b8ce39db"}], 0x28}}], 0x1, 0x0) 23:21:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0xb}}], 0x18}, 0x0) 23:21:53 executing program 1: keyctl$link(0x4, 0x0, 0xfffffffffffffffe) 23:21:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f00007fe000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 23:21:53 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:21:53 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/fuse\x00', 0x2, 0x0) 23:21:53 executing program 4: socket$inet(0x2, 0x3, 0x7f) 23:21:53 executing program 1: syz_mount_image$fuse(&(0x7f0000000200)='fuse\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[@ANYBLOB=',g']) 23:21:53 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x6, r1, r2, r0, 0x0) 23:21:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000007640)={0x0, 0x0, &(0x7f0000007600)={0x0}}, 0x0) 23:21:53 executing program 5: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) msync(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0) 23:21:53 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, 0xfffffffffffffffa, 0x0) 23:21:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}) 23:21:53 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ftruncate(r0, 0x16) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 23:21:54 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0x40189206, 0x0) 23:21:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f00007fe000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 23:21:54 executing program 1: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f00004a5000/0x4000)=nil, 0x4000, 0x0, 0x100010, r0, 0x0) 23:21:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="a05da0ae6f60bf66c9d48fda45dd395e56cf79c7facb35f0b89b079ff46ca75585410e6ddf12046b30b58ace7adc029c274240751f0f36fe91b1e31624d8b26b9222c68a786e4d979fe00461327de2dba396860c37729abc1b8156d4caf30bb9db5983794cfc299d15f8703bf2a66e58415148ecd9df62e6bcf52767b0877f7a7f9aafcf27b3a67dcedf423c9f9d", 0x8e}], 0x1, &(0x7f0000000300)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}], 0x18}, 0x0) 23:21:54 executing program 2: sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) mincore(&(0x7f000032c000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/131) 23:21:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8912, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 23:21:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) 23:21:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @empty, 0xffffffff}, 0x1c, 0x0}, 0x0) 23:21:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000040)=0x4) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)=0x1) 23:21:54 executing program 5: sigaltstack(&(0x7f000078f000/0x1000)=nil, 0x0) munlock(&(0x7f0000358000/0x4000)=nil, 0x4000) 23:21:54 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000006b80)='/proc/timer_list\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) 23:21:54 executing program 1: socketpair$unix(0x1, 0x8b1c3b9dbcc1803d, 0x0, 0x0) 23:21:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f00007fe000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 23:21:54 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000009700)='/proc/asound/timers\x00', 0x0, 0x0) 23:21:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 23:21:54 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1d, r1, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) 23:21:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x8, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0}, 0x20008001) 23:21:54 executing program 4: r0 = creat(0x0, 0x104) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000540)={0x3, 0x15, 0x0, 0x0, 0xcd, 0x0, &(0x7f0000000440)="0d5d107c002a4105480d452386ba658b00bec5df937773543ed36d49b745ba123d46f998044655534267c02e07242b104f05eab8538cffe1ab191fd5550a2461a714050810e6be833ba6838bd111e0ed7ad4df73e7c9de2fd17371c08e5c8f61447493e6d55991a78b272f51627983bb4b61f3e152c30b4d74adefa19a2b136a1ee7a6b17e5af205f3d4b836b7abc43561521e6459e8b707465567c84ab137d081395d899923f0716073b919fffb6d61b99308e4423dd6f7ed75a386c1cd56422ec26e1e07ff78e70cf74ac6e2"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x398, 0x0, 0x0, 0x228, 0x0, 0x228, 0x300, 0x300, 0x300, 0x300, 0x300, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x93, 0x0, 0x41, 0x0, 0x0, 0x5, 0x40, 0x4}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "dae7bbe9998a260a8f00a30e54d356de8911e05d607ed2184b8a7d2f9d2e"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3f8) preadv(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/52, 0x34}], 0x1, 0x700e, 0x8) 23:21:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8923, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @empty}}) 23:21:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, 0x0, &(0x7f0000000080)) 23:21:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01"], 0x14}}, 0x0) 23:21:54 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002d00)='ethtool\x00', r0) 23:21:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000007640)={0x0, 0x0, &(0x7f0000007600)={0x0}}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000077c0)={0x0, 0x0, &(0x7f0000007780)={0x0}}, 0x0) 23:21:55 executing program 4: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000132000/0x2000)=nil, 0x2000) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) 23:21:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c, 0x0}, 0x20008001) 23:21:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xc) 23:21:55 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@subj_type={'subj_type'}}, {@obj_user={'obj_user'}}]}}) 23:21:55 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, r1) 23:21:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = socket$inet6(0x10, 0x3, 0x0) dup3(r4, r3, 0x0) 23:21:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x31, 0x4, 0x0, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, {[@ssrr={0x89, 0x2b, 0xa0, [@broadcast, @empty, @local, @dev={0xac, 0x14, 0x14, 0x41}, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @private=0xa010101, @broadcast]}, @end, @lsrr={0x83, 0xb, 0x4e, [@rand_addr=0x64010101, @loopback]}, @generic={0x0, 0x4, "9aaf"}, @timestamp={0x44, 0x18, 0xf5, 0x0, 0xd, [0x6d2a, 0x80, 0x4, 0x0, 0x101]}, @timestamp_prespec={0x44, 0x4c, 0x6c, 0x3, 0x0, [{@multicast2}, {@local}, {@dev={0xac, 0x14, 0x14, 0x14}}, {@remote, 0xf18d}, {@broadcast, 0x10001}, {@rand_addr=0x64010100}, {@local}, {@rand_addr=0x64010102, 0xc39b}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}]}, @rr={0x7, 0x7, 0x0, [@private]}, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) 23:21:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x39, {0x0, 0x0, 0x2}}}], 0x18}, 0x0) 23:21:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x32, 0x0, 0x0) 23:21:55 executing program 4: socketpair(0x11, 0x3, 0x7c9, &(0x7f0000000800)) 23:21:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 23:21:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = socket$inet6(0x10, 0x3, 0x0) dup3(r4, r3, 0x0) 23:21:55 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r2}, {r1}, {}, {r1}], 0x4, &(0x7f0000000240)={0x0, 0x989680}, 0x0, 0x0) 23:21:55 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f00000018c0)=[{&(0x7f0000000f80)=@abs, 0x6e, 0x0}], 0x1, 0x0) 23:21:55 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f00000000c0), 0x9) 23:21:55 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) read$char_raw(r0, 0x0, 0x0) 23:21:55 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) pipe(&(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 23:21:55 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, 0x0) 23:21:55 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r2}, {r1}, {}, {r1}], 0x4, &(0x7f0000000240)={0x0, 0x989680}, 0x0, 0x0) 23:21:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = socket$inet6(0x10, 0x3, 0x0) dup3(r4, r3, 0x0) 23:21:55 executing program 1: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002580)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x40000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000040)=""/177, 0xb1}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/115, 0x73}, {&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f00000012c0)=""/164, 0xa4}, {&(0x7f0000001380)=""/118, 0x76}, {0x0}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8, 0xad49, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="200000000000000001"], 0x100}}], 0x1, 0x0) 23:21:55 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r2}, {r1}, {}, {r1}], 0x4, &(0x7f0000000240)={0x0, 0x989680}, 0x0, 0x0) 23:21:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = socket$inet6(0x10, 0x3, 0x0) dup3(r4, r3, 0x0) 23:21:56 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) read$usbmon(r1, &(0x7f00000000c0)=""/9, 0xfffffffffffffe5a) 23:21:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2e, 0x0, 0x0) 23:21:56 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r2}, {r1}, {}, {r1}], 0x4, &(0x7f0000000240)={0x0, 0x989680}, 0x0, 0x0) 23:21:56 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 23:21:56 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) pipe(&(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 23:21:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="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", 0x5ad}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@hoplimit={{0x14}}, @dstopts_2292={{0x18}}], 0x30}}, {{&(0x7f0000002b00)={0xa, 0x4e21, 0x0, @mcast1, 0x20}, 0x1c, 0x0, 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB="a00100000000000029000000370000"], 0x1a0}}], 0x3, 0x80) 23:21:56 executing program 0: waitid(0x6dbbd2d4c820194c, 0x0, 0x0, 0x2, 0x0) 23:21:56 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2009c0, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) 23:21:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x7}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)) 23:21:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 23:21:56 executing program 3: syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)=ANY=[@ANYBLOB='f']) 23:21:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="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", 0x5ad}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@hoplimit={{0x14}}, @dstopts_2292={{0x18}}], 0x30}}, {{&(0x7f0000002b00)={0xa, 0x4e21, 0x0, @mcast1, 0x20}, 0x1c, 0x0, 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB="a00100000000000029000000370000"], 0x1a0}}], 0x3, 0x80) 23:21:56 executing program 1: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002580)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x40000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000040)=""/177, 0xb1}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/115, 0x73}, {&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f00000012c0)=""/164, 0xa4}, {&(0x7f0000001380)=""/118, 0x76}, {0x0}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8, 0xad49, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:56 executing program 2: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002580)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x40000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000040)=""/177, 0xb1}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/115, 0x73}, {&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f00000012c0)=""/164, 0xa4}, {&(0x7f0000001380)=""/118, 0x76}, {0x0}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8, 0xad49, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:57 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="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", 0x5ad}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@hoplimit={{0x14}}, @dstopts_2292={{0x18}}], 0x30}}, {{&(0x7f0000002b00)={0xa, 0x4e21, 0x0, @mcast1, 0x20}, 0x1c, 0x0, 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB="a00100000000000029000000370000"], 0x1a0}}], 0x3, 0x80) 23:21:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x15, 0x0, 0x0) 23:21:57 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) pipe(&(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 23:21:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001180)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000c8c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000007c0)=@pppoe={0x18, 0x0, {0x0, @remote, 'team0\x00'}}, 0x80, 0x0}}], 0x2, 0x0) 23:21:57 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8941, 0x0) 23:21:57 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="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", 0x5ad}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@hoplimit={{0x14}}, @dstopts_2292={{0x18}}], 0x30}}, {{&(0x7f0000002b00)={0xa, 0x4e21, 0x0, @mcast1, 0x20}, 0x1c, 0x0, 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB="a00100000000000029000000370000"], 0x1a0}}], 0x3, 0x80) 23:21:57 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8993, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:57 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 23:21:57 executing program 1: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002580)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x40000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000040)=""/177, 0xb1}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/115, 0x73}, {&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f00000012c0)=""/164, 0xa4}, {&(0x7f0000001380)=""/118, 0x76}, {0x0}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8, 0xad49, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:58 executing program 2: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002580)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x40000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000040)=""/177, 0xb1}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/115, 0x73}, {&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f00000012c0)=""/164, 0xa4}, {&(0x7f0000001380)=""/118, 0x76}, {0x0}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8, 0xad49, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r0) 23:21:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000007640)={0x0, 0x0, &(0x7f0000007600)={0x0}}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000077c0)={&(0x7f0000007680), 0xc, &(0x7f0000007780)={0x0}}, 0x0) 23:21:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x40000, &(0x7f0000002900)=[@rthdr_2292={{0x18}}], 0x18}, 0x0) 23:21:58 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) pipe(&(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 23:21:58 executing program 1: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002580)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x40000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000040)=""/177, 0xb1}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/115, 0x73}, {&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f00000012c0)=""/164, 0xa4}, {&(0x7f0000001380)=""/118, 0x76}, {0x0}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8, 0xad49, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x2, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:21:58 executing program 3: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}]}}) 23:21:58 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) 23:21:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8990, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:21:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:58 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mlock2(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0) 23:21:58 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:59 executing program 2: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000002580)='NLBL_CIPSOv4\x00', 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x40000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000040)=""/177, 0xb1}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/115, 0x73}, {&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f00000012c0)=""/164, 0xa4}, {&(0x7f0000001380)=""/118, 0x76}, {0x0}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8, 0xad49, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:21:59 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mlock2(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0) 23:21:59 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mremap(&(0x7f00001b7000/0x1000)=nil, 0x1000, 0x3000, 0xe, &(0x7f0000342000/0x3000)=nil) 23:21:59 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mlock2(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0) 23:21:59 executing program 5: mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000002280)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xee00}}) 23:21:59 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mlock2(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0) 23:21:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x398, 0x0, 0x0, 0x228, 0x0, 0x228, 0x300, 0x300, 0x300, 0x300, 0x300, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x0, 0x41, 0x0, 0x0, 0x5, 0x40}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "dae7bbe9998a260a8f00a30e54d356de8911e05d607ed2184b8a7d2f9d2e"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3f8) 23:21:59 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 23:21:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0}, 0x804) [ 1272.952065] xt_hashlimit: invalid rate 23:22:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:22:00 executing program 1: socket(0x10, 0x0, 0x81) 23:22:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$pptp(r0, 0x0, 0x0) 23:22:00 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:22:00 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) 23:22:00 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8955, 0x0) 23:22:00 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x1e, r0, 0xfffffffffffffffe) 23:22:00 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0xfffffffffffffd4c) 23:22:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/8) 23:22:00 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055", 0x3f, 0x1c0}]) 23:22:00 executing program 5: keyctl$KEYCTL_MOVE(0x18, 0x0, 0x0, 0x0, 0x0) 23:22:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x14, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:22:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055", 0x3f, 0x1c0}]) 23:22:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:22:01 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:22:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xd, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:22:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipx={0x4, 0x0, 0x0, "0fb26894a695"}, @xdp}) 23:22:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055", 0x3f, 0x1c0}]) 23:22:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'sit0\x00', 0x0}) 23:22:01 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 23:22:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000080)="49b9fa65", 0x4) 23:22:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed, 0x0, 0x3}, 0xe) 23:22:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=ANY=[], 0x18}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00', r0) 23:22:01 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000002bc0)='/proc/locks\x00', 0x0, 0x0) 23:22:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000004e80)={0x1, &(0x7f0000004e40)=[{}]}) 23:22:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000007640)={0x0, 0x0, &(0x7f0000007600)={0x0}}, 0x8040) 23:22:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 23:22:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:22:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r0) request_key(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)='keyring\x00', r0) 23:22:02 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f0000000240)='./file0/../file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 23:22:02 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) connect(r0, &(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "26082d8a9a764922a1a48fa97205496dc3eca5b11bcedeb19a98e9dab488ec4df4e1543c9b23a263772d42d45dd8648bcaec219d1252e324c6badd287c8f2e"}, 0x80) 23:22:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:02 executing program 0: syz_mount_image$fuse(&(0x7f0000000200)='fuse\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[@ANYBLOB='fd=']) 23:22:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000007640)={0x0, 0x0, &(0x7f0000007600)={0x0}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000076c0)='team\x00', 0xffffffffffffffff) 23:22:02 executing program 4: sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x70bd25, 0x25dfdbfc}, 0x14}}, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, &(0x7f0000000040)={'wg0\x00'}) 23:22:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:22:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x0, 0x0, 0x4}, 0x40) 23:22:02 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC]) 23:22:02 executing program 4: mlock(&(0x7f0000000000/0x2000)=nil, 0x2000) 23:22:02 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) sendfile(r0, r1, 0x0, 0x9) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r3, 0x0) preadv(r2, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 23:22:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') read$FUSE(r0, 0x0, 0x0) 23:22:03 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f0000000240)='./file0/../file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 23:22:03 executing program 4: creat(0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x398, 0x0, 0x0, 0x228, 0x0, 0x228, 0x300, 0x300, 0x300, 0x300, 0x300, 0x3, 0x0, {[{{@ip={@multicast2, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x93, 0x0, 0x41, 0x0, 0x0, 0x5, 0x40, 0x4}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00'}}, {{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "dae7bbe9998a260a8f00a30e54d356de8911e05d607ed2184b8a7d2f9d2e"}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3f8) 23:22:03 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:03 executing program 0: socketpair(0x2, 0x3, 0x3, &(0x7f0000000040)) 23:22:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89b0, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @mcast2}}) 23:22:03 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000372000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mincore(&(0x7f0000373000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/152) 23:22:03 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f0000000240)='./file0/../file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 23:22:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x48) 23:22:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x16, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:22:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x2d) 23:22:03 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mlock(&(0x7f00005c7000/0x3000)=nil, 0x3000) mlock(&(0x7f0000132000/0x2000)=nil, 0x2000) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) 23:22:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x3b) 23:22:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8948, &(0x7f0000000040)={'wg0\x00'}) 23:22:03 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) 23:22:04 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:04 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000044c0)=ANY=[]) 23:22:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000002740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB=' '], 0x100}}], 0x1, 0x0) 23:22:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:22:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f0000000240)='./file0/../file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 23:22:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @mcast2}}) 23:22:04 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id'}}) 23:22:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x6, 0x0, 0x0) 23:22:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x34}}], 0x18}, 0x0) 23:22:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x4008ae06, 0x0) 23:22:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x3, r0, 0xfffffffffffffffe) 23:22:05 executing program 1: pselect6(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x5]}, 0x8}) 23:22:05 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:05 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2009c0, 0x0) 23:22:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x2000055c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18}}], 0x18}, 0x0) 23:22:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x6}) 23:22:05 executing program 2: keyctl$link(0xe, 0x0, 0xfffffffffffffffe) 23:22:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x9600}, 0x0) 23:22:05 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 23:22:05 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x20deb010) 23:22:05 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x890c, 0x0) 23:22:05 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0xffffffffffffffff, 0x101040) 23:22:05 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x0, @local}, 0xfffffffffffffe68) 23:22:06 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000480)) 23:22:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:06 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f00000021c0)='comm\x00') 23:22:06 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 23:22:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x418, 0xd0, 0x3a0, 0x3a0, 0xd0, 0x3a0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="5da045b87d19"}}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'geneve1\x00', 'veth1_vlan\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x478) 23:22:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x6}) 23:22:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="a05da0ae6f60bf66c9d48fda45dd395e56cf79c7facb35f0b89b079ff46ca75585410e6ddf12046b30b58ace7adc029c274240751f0f36fe91b1e31624d8b26b9222c68a786e4d979fe00461327de2dba396860c37729abc1b8156d4caf30bb9db5983794cfc299d15f8703bf2a66e58415148ecd9df62e6bcf52767b0877f7a7f9aafcf27b3a67dcedf423c9f9d900bbcc7", 0x92}], 0x1, &(0x7f0000000300)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}], 0x18}, 0x0) 23:22:06 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 23:22:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000024c0)=[{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000180)="92b025ec825ba48152388b1efc371414428867b3d5dc2bbb8d8ae3ba4560f2be62cefa22637adb60ae9b7ad58d9f8df2b70e001e5fca3c34f5a06834a2e6bc7910257b463a", 0x45}], 0x1}], 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000001c0)) 23:22:06 executing program 2: sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) msync(&(0x7f000050c000/0x2000)=nil, 0x2000, 0x0) 23:22:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="ff7825fd3c5e8a13e094581f3b13631b6fc7a38e60d6649fa0980be3ce8fe8e68504ce482770b680a10c13b2c931b7b080eb3424ac9e081005caf53f9c8242f60a588904172ebbd95568e13973ce7fa1333fd51211f688432168a8cb308ff0b37495b01e97f5cb8e0a3fd7a6f80c914dbaaf8033c1cb76ab70b826ca542b990608071ed2a02e87077a122e18f5e8f0442a7a436f0fbb8544e4f476819798ca269d35860c3a078aeec8f875ba3d7a1082fb78fab7f8a41337b510c78e7bbd45e1f520c57afa5f2680d79e605cc695147b6bc006127cdc10c06fe51bdffbda985522fb30c3e5a038166ed34047849dfc016c1c1aff2e7e2d4ce7358a6db1d3a9036505fe5a47525c1432d7dee132cbc725dc3e01f4fdfee4af6c15cd0929b6755a145f72dafc565d9c63bbb2a96b165d808e411d2ca7e25ea0b510a3450dddb9349c8003eb8c720dca94b4b33077655b285e67a93c9ff8bb88b3edb7f9c2e4d0c98b033531c930b2ed5bed7cf4e41a68be1270831fe9f1267cca6aad1700b08b8498d9c3ec24766db586d8563fe795534ee703a35f27e38ab1999827546a084b26cd1c049b58c728b8d015629ecb291de96e5d6425437b38dd03a8f7616701719f3f82f45d44f7000a58f9a57854440f5e21e54fcfcf16fc05c54ab695ee14bd23ec54dbbb79080a62f54a4ee080edc7b90ef72fd24fd64abf1932297abe3e83f89187d09444d6baa7ee337bc7f378ce756c793816b57def52bdac8f12980985528eefc688dc581d88ff6c98845b0403a744cae763f99ee3faf290f90fcd91b712089c8fb735da50af15994f4f76bab894f43bcd66813158c72ab3fbe3e214e85ba08365e69b290b9c1c0b0cf20c26ff3f912f9296082ed0528566d04b83cd00eec3e1b9ab8fa072c888dd1c7749b7610c6fcdfe708a2d8772807c17f3c2298b5da77108ba8de2bde01a7ad19b22eaa97e66a22e1691e10b492179e1932ebcdc927f1e7cfb1b0f09431ddb4ff06ef84e2c4ebfb6b629bba271c27ec3f9a4ed4b176640b7f0fe571e7617f363ab7dde58e79d30c3eb77fe4def576bcbe5784b1365ef95036ad9dac512b88eed67f4cfc07f718c3ec838570e70b7b5c1f784385ac39531f43276dcfec7f11e0855a8ac84f01295024365ec198d6d1b4b945ff35a26a2758dcd0431b452cd33d77dadc992242e229cbe35632738e4a00601221fbe1d9af29615b8dd458a9f08952daea939c499a27762e47fd977b2e91536a88280149f03098eed65ca330d380f3c62e04d8e30e10d608dee4027d82c222a5402ecfe8d73b98ae397f81b2734ad8f581e51eac450aea8b2496b70ced173947ff3b335829bd4f84643ce66369e6dc6ad977bef02033e66ec418bd4adcaf250a1fa7de70612acdb2c9670294919beab8ff73b321b099fded48809b70e3f47ceb4c9052503a1cb1bb39fb71e05ba0a970f963581c253ba47e512b7c8bbafef5468666eff0266e983bf396167695d2e153c93967ba8e501c44972e1c312a7b3f76965cf7144ee507b4b704f0ed7bcfccc8127ad691dd247dca34ef0ce85f6ad96bb30c224acffb7e095f00a156b5f67fa79f0952a97d2094b93a83003362e1b2d3733fcc8b45f2b53ba0207d9e34a6e713aac29c5de8666032dd05fbdc30648ddcd19f2552abf98433ade9d55c0287b98e50c97e0395bd93abc3b5f22ce221790a44079f26d293649d2bde6887cdac380ba7f3244641432dd26169554cc07eaf193ae853fd0bbaece065e0a14b1ca413b070206ecb405823609b309f1a5610c80d51b55e2a423c32dc191692332e0db6ab85d476bc832b85cfcbee8d897e64d3854eb28b49f3f4fd556ef55d5a30ba05e4db692bdbfb81c133e62aa24e62d57d20387abfcbb5fd5ff1b67e8f9b6765331d6c14c6da107d9c779995fa67aa3a27417948c9cfe203d21b66961a95c725ea1657caf33b0eac7f037a360c2ca2d57eb32d3b32a5c8b057f28917021213f83c3dabb240e5eb6a29040d49075f52fdecd6595d2cc3a6c546b34e2232cf09a83f5a7", 0x5ad}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@hoplimit={{0x14}}, @dstopts_2292={{0x18}}], 0x30}}, {{&(0x7f0000002b00)={0xa, 0x4e21, 0x0, @mcast1, 0x20}, 0x1c, 0x0, 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB="a001000000000000"], 0x1a0}}], 0x3, 0x0) 23:22:06 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)=[{}, {0xfffe, 0x45, 0x0, 0x8}]}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, &(0x7f0000000040)={'wg2\x00'}) 23:22:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:06 executing program 4: sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="43bcb2133426d9ae1941c86d", 0xc}], 0x1}, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, &(0x7f0000000040)={'wg0\x00'}) 23:22:06 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000080)={0x0, 0xfff}) 23:22:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="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", 0x5ad}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@hoplimit={{0x14}}, @dstopts_2292={{0x18}}], 0x30}}, {{&(0x7f0000002b00)={0xa, 0x4e21, 0x0, @mcast1, 0x20}, 0x1c, 0x0, 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB="a001000000000000"], 0x1a0}}], 0x3, 0x0) 23:22:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x6}) 23:22:07 executing program 5: request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='syz', 0x0) 23:22:07 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046629, 0x0) 23:22:07 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="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", 0x5ad}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@hoplimit={{0x14}}, @dstopts_2292={{0x18}}], 0x30}}, {{&(0x7f0000002b00)={0xa, 0x4e21, 0x0, @mcast1, 0x20}, 0x1c, 0x0, 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB="a001000000000000"], 0x1a0}}], 0x3, 0x0) 23:22:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x3}}], 0x18}, 0x0) 23:22:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x37}}], 0x18}, 0x0) 23:22:07 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890c, &(0x7f0000000040)={'wg0\x00'}) 23:22:07 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) [ 1280.510287] audit: type=1804 audit(1616109727.494:365): pid=4656 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir788043214/syzkaller.Ri0lzl/990/cgroup.controllers" dev="sda1" ino=16900 res=1 23:22:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89a0, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:22:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r2, &(0x7f00000045c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="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", 0x5ad}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001a40)=[@hoplimit={{0x14}}, @dstopts_2292={{0x18}}], 0x30}}, {{&(0x7f0000002b00)={0xa, 0x4e21, 0x0, @mcast1, 0x20}, 0x1c, 0x0, 0x0, &(0x7f0000004900)=ANY=[@ANYBLOB="a001000000000000"], 0x1a0}}], 0x3, 0x0) 23:22:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000ac0)={'ip6_vti0\x00', 0x0}) 23:22:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x6}) 23:22:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x7, 0x0, 0x0) 23:22:08 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:08 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) 23:22:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_timeval(r0, 0x1, 0x43, 0x0, &(0x7f00000000c0)) 23:22:08 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', r0) 23:22:08 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8902, 0x0) 23:22:08 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) 23:22:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@hoplimit_2292={{0x14}}], 0x18}, 0x804) 23:22:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000004e80)={0x1, &(0x7f0000004e40)=[{0xffff}]}) 23:22:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @mcast2}}) 23:22:09 executing program 4: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 23:22:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@dontfrag={{0x14}}], 0x18}, 0x20008001) 23:22:09 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x0, 0x0) 23:22:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x7}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)) 23:22:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, 0x0, 0x0) 23:22:09 executing program 4: socket$inet(0x2, 0x5, 0xab) 23:22:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], 0x18}, 0x0) 23:22:09 executing program 0: syz_mount_image$fuse(&(0x7f0000000100)='fuse\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f0000001140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id'}}) 23:22:09 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x0, 0x0) 23:22:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:09 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r0, 0x0) 23:22:09 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/fuse\x00', 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/fuse\x00', 0x2, 0x0) 23:22:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x99) 23:22:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x10) 23:22:09 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x0, 0x0) 23:22:09 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x1a, 0x0) 23:22:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000200), 0x4) 23:22:09 executing program 4: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x80}, &(0x7f0000000140)={0x77359400}, 0x0) 23:22:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0) 23:22:09 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x0, 0x0) 23:22:09 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='.\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESDEC=r1]) 23:22:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:10 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={0x0, 0x0, 0x18}, 0x10) 23:22:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@rthdr_2292={{0x18, 0x29, 0x3e}}], 0x18}, 0x0) 23:22:10 executing program 5: syslog(0x4, &(0x7f0000000080)=""/142, 0x8e) 23:22:10 executing program 0: pselect6(0x40, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x5]}, 0x8}) 23:22:10 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x5, r1, 0x0, 0x0, 0x0) 23:22:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getqdisc={0x28, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0x10}}, [{0x4}]}, 0x28}}, 0x0) 23:22:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000022c0)=@newtfilter={0x38, 0x2c, 0x11, 0x0, 0x0, {}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_CHAIN={0x8}]}, 0x38}}, 0x0) 23:22:10 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1d, r1, 0x0, 0x0, 0x0) 23:22:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x88, 0x40, 0x0, 0x0) 23:22:10 executing program 5: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 23:22:10 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002140)='fuse\x00', &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) 23:22:11 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:11 executing program 2: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ff2000/0xd000)=nil, 0xd000) 23:22:11 executing program 4: mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) 23:22:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000007640)={0x0, 0x0, &(0x7f0000007600)={0x0}}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000077c0)={&(0x7f0000007680)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000007780)={0x0}}, 0x0) 23:22:11 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000132000/0x2000)=nil, 0x2000) mlock(&(0x7f00005c7000/0x4000)=nil, 0x4000) munlock(&(0x7f00005c8000/0x2000)=nil, 0x2000) 23:22:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000000)={@empty}, 0x14) 23:22:11 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x16}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f00000000c0)) 23:22:11 executing program 4: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 23:22:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8903, &(0x7f0000000200)={'ip6erspan0\x00', @ifru_addrs=@can}) 23:22:11 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8bffffd79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fefdff0000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c3a1f59916ffc9bf0bd09f07fb2ea80e5cf8dcf819b5c0c00000000000090af27db5b56024db96b4673b4e8d5467e3554508535766c80114604eab9b290a248a120c9c6e39f403ff065fd3052aae80677eeba68562eaeaea5fecf298ca20f274233106e2baf69b1c66c01e4099f366b89ab63ecf92b2704550a4d1dd5c50b7420b48a93fe94c756108afcd0b2eb785632e0a85f02a5a6474ae549070000000000000094fba0ed5020e6477cc921fee1f6d8ad6a80d0947cd6d4a561ced23b0b4a902be6af7ec2d1ba0000000000000000000000000000000000aaf25343063e6581f9e6de14ad72e5ad84309fc4c927ec6cd20cef7ed95157abb19700f0077e9d13d8b93eb0f2c6f8941e35e1577c10e509c9b134515d3d2369f516a49eeeb1a662c849eb709df5c6ba73cccdfa3c58bc5204339b0b487f0eeed581cb202994c41d322717c338033213c18a34ee0ca2cf61efb4b3797a642735d6d482ba98d252f36c54333aab1aa736369393239820f5f1557b0b2962c2f7ccb0a5a13c714e0b1a5bc3f9caff3283076cda3d0b1a2905cf7bd04f1de44bc40528ad807970727fb819afa14aad99f93093ced7dd51995edcf53b907228fa9e83433eedb4ac88d0285594ffb0d14e71d5c57f33702f22b22417bfb38d04c8441ceec8bcaffbe800a041"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x27, 0x303, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe10e004000632b77fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) 23:22:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 23:22:11 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev2(r2, &(0x7f0000000140)=[{0x0}], 0x500, 0x0, 0x0, 0x0) 23:22:12 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:12 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) close(r2) 23:22:12 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5411, &(0x7f0000000040)={'wg0\x00'}) 23:22:12 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 23:22:12 executing program 4: socketpair(0xf, 0x3, 0x0, &(0x7f0000000500)) 23:22:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 23:22:12 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x0, 0x8d}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x8031, 0xffffffffffffffff, 0x0) 23:22:12 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8983, 0x0) 23:22:12 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8916, &(0x7f0000000040)={'wg0\x00'}) 23:22:12 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x12001, 0x0) 23:22:12 executing program 2: mmap$perf(&(0x7f00005c8000/0x3000)=nil, 0x3000, 0x4, 0x82032, 0xffffffffffffffff, 0x0) 23:22:12 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:22:13 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:13 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$inet(r0, &(0x7f00000019c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}], 0x30}}], 0x1, 0x0) 23:22:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0}, 0x0) 23:22:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x11, 0x0, 0x0) 23:22:13 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @local}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) 23:22:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@tclass={{0x14}}], 0x18}, 0x0) 23:22:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000006700)={&(0x7f0000006600), 0xc, 0x0}, 0x0) 23:22:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000003c0)={'batadv_slave_0\x00'}) 23:22:13 executing program 1: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 23:22:13 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000006b00)='/proc/key-users\x00', 0x0, 0x0) 23:22:13 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:22:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x0, 0x0, 0x16}]}) sigaltstack(&(0x7f0000000000/0x800000)=nil, 0x0) 23:22:14 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002300)={'team0\x00'}) 23:22:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 23:22:14 executing program 0: pselect6(0x40, &(0x7f0000000080), 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0}) 23:22:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000004c00)={&(0x7f0000000540)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@dontfrag={{0x14, 0x29, 0x3e, 0x9}}, @rthdr_2292={{0x18}}], 0x30}, 0x0) 23:22:14 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x2, r0, 0xfffffffffffffffe) 23:22:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) 23:22:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@private1, @dev, @mcast1, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x3800000}) 23:22:14 executing program 5: syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x1, 0x0) 23:22:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) 23:22:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@getqdisc={0x24, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 23:22:14 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x0, 0x0, 0x12f}, 0x40) 23:22:14 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xcac0, 0x0) mount$bind(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x49008, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x865000, 0x0) 23:22:14 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x200, 0x0) [ 1287.525926] audit: type=1800 audit(1616109734.504:366): pid=4991 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=14228 res=0 23:22:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000ec0)={'syztnl1\x00', 0x0}) 23:22:15 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:15 executing program 2: syz_genetlink_get_family_id$ethtool(&(0x7f00000006c0)='ethtool\x00', 0xffffffffffffffff) 23:22:15 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000a00)=@raw=[@btf_id], &(0x7f0000000a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 23:22:15 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00', 0xffffffffffffffff) 23:22:15 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x301600, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 23:22:15 executing program 4: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000980)='tasks\x00', 0x2, 0x0) 23:22:15 executing program 5: syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 23:22:15 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:15 executing program 2: syz_open_dev$mouse(&(0x7f0000000b40)='/dev/input/mouse#\x00', 0x0, 0x20000) 23:22:15 executing program 1: syz_open_dev$mouse(&(0x7f0000000e80)='/dev/input/mouse#\x00', 0x0, 0x341000) 23:22:15 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000440)={&(0x7f0000000300), 0xc, 0x0}, 0x0) 23:22:15 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:15 executing program 0: mknodat$null(0xffffffffffffffff, 0x0, 0xa2216172abfb2b4, 0x103) 23:22:15 executing program 5: openat$tun(0xffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x204000, 0x0) 23:22:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x5, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) 23:22:15 executing program 4: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)=',\x00', 0x0) 23:22:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000100)) 23:22:15 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:15 executing program 1: io_setup(0x7fff, &(0x7f0000000000)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000001300)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f0000000040)}]) 23:22:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x894a, 0x0) 23:22:15 executing program 4: ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) 23:22:15 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:15 executing program 2: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x100, 0xe4b43) 23:22:15 executing program 0: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYRESHEX=r0], &(0x7f0000000340)='syzkaller\x00', 0x84, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x5}, 0x10}, 0x74) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r1, &(0x7f0000000140)="c5", 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x517, 0x102, 0x0) 23:22:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', r0) 23:22:15 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:15 executing program 2: io_setup(0x7fff, &(0x7f0000000000)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000001300)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 23:22:15 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x5, 0x5, 0x401, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 23:22:15 executing program 4: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0xffffffffffffff26) 23:22:15 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5452, &(0x7f0000000000)={'wg2\x00'}) 23:22:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}}, 0x0) 23:22:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x402c5828, 0x0) 23:22:16 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:16 executing program 5: socket(0x25, 0x3, 0xdcef) 23:22:16 executing program 0: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYRESHEX=r0], &(0x7f0000000340)='syzkaller\x00', 0x84, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x5}, 0x10}, 0x74) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r1, &(0x7f0000000140)="c5", 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x517, 0x102, 0x0) 23:22:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8904, &(0x7f0000000280)={'wg2\x00'}) 23:22:16 executing program 1: io_setup(0x7fff, &(0x7f0000000000)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000001300)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x0, r1, 0x0, 0x0, 0x997}]) 23:22:16 executing program 2: io_setup(0x401, &(0x7f0000000000)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001880)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 23:22:16 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x3a, 0x0, 0x0) 23:22:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x16, 0x0, 0x6, 0x3ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x40) 23:22:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000, 0x0, 0x1}, 0x40) 23:22:16 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:16 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000008c0)={&(0x7f0000000840)=""/86, 0x0, 0x1000}, 0x1c) 23:22:16 executing program 1: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='*\xe2)\x80:\x00', 0xffffffffffffffff) 23:22:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x40) 23:22:16 executing program 0: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYRESHEX=r0], &(0x7f0000000340)='syzkaller\x00', 0x84, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x5}, 0x10}, 0x74) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r1, &(0x7f0000000140)="c5", 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x517, 0x102, 0x0) 23:22:16 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)={[{@fat=@gid={'gid'}}]}) 23:22:16 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0xd8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x4}]}, 0xd8}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="94020000", @ANYRES16=r1, @ANYBLOB="89002cbd7000fcdbdf2503", @ANYRES32], 0x294}}, 0x0) 23:22:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000001280)=ANY=[@ANYBLOB="5c040000", @ANYRES16, @ANYBLOB="01"], 0x45c}}, 0x0) 23:22:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="94020000", @ANYRES16=r1, @ANYBLOB="89002cbd7000fcdbdf2502"], 0x294}}, 0x0) 23:22:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0xb, 0x3, "deff20d2717e2a"}]}, 0x20}}, 0x0) [ 1290.071712] netlink: 640 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1290.122473] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1290.132375] FAT-fs (loop4): bogus number of reserved sectors [ 1290.142760] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1290.157471] netlink: 640 bytes leftover after parsing attributes in process `syz-executor.5'. 23:22:17 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0x1a, 0x0, 0x1, [@AF_INET6={0x4}]}]}, 0x28}}, 0x0) 23:22:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0xe8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0xe8}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="94020000", @ANYRES16=r1, @ANYBLOB="89002cbd7000fcdbdf2503", @ANYRES32], 0x294}}, 0x0) 23:22:17 executing program 5: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 23:22:17 executing program 0: r0 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYRESHEX=r0], &(0x7f0000000340)='syzkaller\x00', 0x84, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x5}, 0x10}, 0x74) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r1, &(0x7f0000000140)="c5", 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x517, 0x102, 0x0) 23:22:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x4, [], 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) 23:22:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000004c0)={[{@fat=@check_relaxed='check=relaxed'}, {@fat=@umask={'umask'}}]}) [ 1290.371520] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 23:22:17 executing program 5: openat$tun(0xffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000c80)='./file0\x00', 0x0, 0x3, &(0x7f0000000f40)=[{&(0x7f0000000cc0)="92", 0x1, 0x67b}, {&(0x7f0000000d00)='`', 0x1}, {&(0x7f0000000e00)="1c", 0x1}], 0x0, 0x0) [ 1290.421191] netlink: 364 bytes leftover after parsing attributes in process `syz-executor.4'. 23:22:17 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:17 executing program 2: syz_open_dev$evdev(&(0x7f0000001300)='/dev/input/event#\x00', 0xffffffff, 0x40c0) 23:22:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5452, &(0x7f0000000280)={'wg2\x00'}) 23:22:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x76, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_smc={0xfe, 0x6}, @fastopen={0x22, 0x3, '\x00'}, @mptcp=@ack={0x1e, 0x12, 0x0, 0x4, "9f00d3a9c1e5b83ff2096d6e619d"}, @mptcp=@remove_addr={0x1e, 0x6, 0x0, 0x0, "13b132"}, @md5sig={0x13, 0x12, "2c415bb5e4f1459ea69359b5512663cc"}]}}}}}}}, 0x0) 23:22:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8918, &(0x7f0000000000)={'team0\x00'}) 23:22:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x894a, &(0x7f0000000280)={'wg2\x00'}) [ 1290.964519] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:22:18 executing program 0: pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) 23:22:18 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x104, 0x0, 0x0) 23:22:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8993, &(0x7f0000000280)={'wg2\x00'}) 23:22:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000280)={'wg2\x00'}) 23:22:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 23:22:18 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='pipefs\x00', 0x0, 0x0) 23:22:18 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8912, &(0x7f0000000280)={'wg2\x00'}) 23:22:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}]}, 0x20}}, 0x0) 23:22:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd}, 0x40) 23:22:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000340)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f00000014c0)) 23:22:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5450, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000004c0)={'sit0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000040)={@mcast2, r4}, 0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={@dev, 0x3e, r4}) 23:22:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={0x0}}, 0x1) 23:22:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0xc0045878, 0x0) 23:22:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8904, &(0x7f0000000000)={'team0\x00'}) 23:22:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000001c0)=0x1) 23:22:19 executing program 4: clock_adjtime(0x0, &(0x7f0000000000)={0x996d}) 23:22:19 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@ipv4={[], [], @loopback}, r1}, 0x14) 23:22:19 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x24, 0x21, 0xf1d}, 0x24}}, 0x0) 23:22:19 executing program 5: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000580)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 23:22:19 executing program 4: io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r0, 0x0, 0x0) 23:22:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x7, 0x81, 0x3ff, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 23:22:19 executing program 2: r0 = openat$vfio(0xffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r0, 0x3b70, 0x0) 23:22:19 executing program 2: openat$bsg(0xffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x410002, 0x0) 23:22:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x2}, 0x2000004c, &(0x7f00000000c0)={0x0}}, 0x0) 23:22:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8942, &(0x7f0000000000)={'team0\x00'}) 23:22:20 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockname(r0, &(0x7f0000000400)=@pppol2tpv3in6, &(0x7f0000000480)=0x80) 23:22:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 23:22:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x23, 0x0, 0x0) 23:22:20 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:20 executing program 1: r0 = openat$bsg(0xffffff9c, &(0x7f0000002240)='/dev/bsg\x00', 0x0, 0x0) futimesat(r0, &(0x7f0000000280)='./file0\x00', 0x0) 23:22:20 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="79a0aa3082dd", @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "1224bf", 0x8, 0x3a, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[], @echo_request}}}}}, 0x0) 23:22:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89b1, &(0x7f0000000280)={'wg2\x00'}) 23:22:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x7, 0x81, 0x3ff, 0x0, 0x1, 0x2}, 0x40) 23:22:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000c40)='vfat\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f40), 0x0, &(0x7f0000000f80)) 23:22:20 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 23:22:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x541b, &(0x7f0000000000)={'team0\x00'}) 23:22:20 executing program 1: r0 = openat$bsg(0xffffff9c, &(0x7f0000002240)='/dev/bsg\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 23:22:20 executing program 4: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f40), 0x0, 0x0) 23:22:20 executing program 0: io_setup(0x3, &(0x7f0000000040)=0x0) io_pgetevents(r0, 0x101, 0x0, 0x0, 0x0, 0x0) 23:22:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x5, &(0x7f0000000040)={@mcast2}, 0x14) 23:22:21 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8927, &(0x7f0000000280)={'wg2\x00'}) 23:22:21 executing program 2: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, r0+10000000}, 0x0) 23:22:21 executing program 4: request_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0xfffffffffffffff8) 23:22:21 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500), &(0x7f0000000680)={&(0x7f0000000640)={[0xfffffffa]}, 0x8}) 23:22:21 executing program 0: setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0xfffffffffffffcf4) 23:22:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000080), 0x4) 23:22:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5450, 0x0) 23:22:21 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x42, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000002040)='./file0\x00', &(0x7f0000004300)='fuseblk\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000440)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) read$FUSE(r0, 0x0, 0x0) 23:22:21 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 23:22:21 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 23:22:21 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4, 0x0) sendfile(r0, r1, 0x0, 0x0) 23:22:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:22:22 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0000, 0x112) renameat2(r0, 0x0, 0xffffffffffffffff, 0x0, 0x6) 23:22:22 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 23:22:22 executing program 0: bpf$OBJ_GET_PROG(0x15, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) 23:22:22 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:22 executing program 2: bpf$ITER_CREATE(0x23, &(0x7f0000000040), 0x8) 23:22:22 executing program 1: syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00', 0xffffffffffffffff) 23:22:22 executing program 2: bind$pptp(0xffffffffffffffff, 0x0, 0x0) 23:22:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@SMC_PNETID_IBPORT={0x5}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_0\x00'}, @SMC_PNETID_IBPORT={0x5}, @SMC_PNETID_IBPORT={0x5}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0xffffffffffffff2e}}, 0x0) 23:22:22 executing program 4: bpf$ITER_CREATE(0x16, 0x0, 0x0) 23:22:22 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x0, 0x0) 23:22:22 executing program 2: bpf$ITER_CREATE(0x1e, 0x0, 0x0) 23:22:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1}, 0x14}}, 0x0) 23:22:22 executing program 4: bpf$ITER_CREATE(0x23, 0x0, 0x0) 23:22:22 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)) 23:22:22 executing program 5: bpf$ITER_CREATE(0x1d, 0x0, 0x0) 23:22:23 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:23 executing program 2: bpf$ITER_CREATE(0x17, &(0x7f0000000040), 0x8) 23:22:23 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 23:22:23 executing program 4: setresuid(0xffffffffffffffff, 0xee00, 0xee00) 23:22:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = inotify_init1(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) 23:22:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000000)={'caif0\x00', @ifru_mtu}) 23:22:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x80}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:22:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$inet6(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="18"], 0x18}, 0x0) 23:22:23 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}, 0x0) 23:22:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe64766024c497b6a", 0x9b}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$netlink(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 23:22:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1f}, 0x1c) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 23:22:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, 0x1c) 23:22:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000000)=0x15) 23:22:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) connect$netlink(r1, &(0x7f0000000340)=@unspec, 0xc) 23:22:24 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:24 executing program 1: r0 = socket(0x1, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="300000000000000029000000370000090000000000000000c91000000000000000000000000000000000000000000000140000000000000029000000430000000100000000000000400000000000000029000000360000008704000000000000071000000002023f0000040000000000000001090000000000000000000001000104000000000000140000000000000029000000430000000a3a00000000000088"], 0x128}, 0x0) 23:22:24 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe64766024c497b6a", 0x9b}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f3", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:24 executing program 4: r0 = socket(0x2, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c) 23:22:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00') read$FUSE(r0, &(0x7f0000001640)={0x2020}, 0x2020) 23:22:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/119, 0x77}], 0x1, 0x0) 23:22:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x1646c000) chdir(&(0x7f0000000100)='./file0\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f0000000180)=ANY=[], 0x10) open(0x0, 0x80, 0x0) fallocate(r1, 0x0, 0x0, 0x400c) lseek(0xffffffffffffffff, 0x0, 0x0) dup2(r0, r1) write$binfmt_elf64(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1001) 23:22:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, '.\x00'}, 0x6e) 23:22:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec2088", 0x34}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$netlink(r1, &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004c40)=[@cred={{0x1c}}], 0x20}, 0x0) [ 1298.050671] ptrace attach of "/root/syz-executor.1"[13329] was attempted by "/root/syz-executor.1"[5536] 23:22:25 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd600000fe001c2c00fe8000000000000000000000000000aafe8000020000000000000000000000aa84"], 0x0) [ 1298.157686] ptrace attach of "/root/syz-executor.1"[13329] was attempted by "/root/syz-executor.1"[5551] 23:22:25 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(0x0, 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:25 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/119, 0x77}], 0x1, 0x0) 23:22:25 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f3", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:25 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe64766024c497b6a", 0x9b}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:25 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(0x0, 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000640)=@bridge_getneigh={0x28, 0x1e, 0x613, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 23:22:25 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(0x0, 0x8b, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) [ 1298.866666] ptrace attach of "/root/syz-executor.1"[13329] was attempted by "/root/syz-executor.1"[5573] 23:22:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000640)=@bridge_getneigh={0x28, 0x1e, 0x613, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 23:22:26 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000640)=@bridge_getneigh={0x28, 0x1e, 0x613, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 23:22:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/119, 0x77}], 0x1, 0x0) 23:22:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000640)=@bridge_getneigh={0x28, 0x1e, 0x613, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 23:22:26 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$netlink(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x1) 23:22:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f3", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 1299.620012] ptrace attach of "/root/syz-executor.1"[13329] was attempted by "/root/syz-executor.1"[5605] 23:22:26 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe64766024c497b6a", 0x9b}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x207a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x47141, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ftruncate(r0, 0x6) 23:22:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/119, 0x77}], 0x1, 0x0) 23:22:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x207a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x47141, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ftruncate(r0, 0x6) 23:22:27 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:27 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x207a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x47141, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ftruncate(r0, 0x6) 23:22:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f3", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x207a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x47141, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ftruncate(r0, 0x6) [ 1300.320075] ptrace attach of "/root/syz-executor.1"[13329] was attempted by "/root/syz-executor.1"[5634] 23:22:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000002140)=@file={0x1, './file0\x00'}, 0x6e) 23:22:27 executing program 5: r0 = socket(0x2, 0x2, 0x0) connect$netlink(r0, &(0x7f0000000000)=@proc, 0xc) 23:22:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d7", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:27 executing program 0: socket(0x2, 0xa, 0x0) socket(0x11, 0x3, 0x0) 23:22:27 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:27 executing program 2: r0 = socket(0x2, 0x2, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 23:22:27 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:27 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:28 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 1301.530388] ieee802154 phy0 wpan0: encryption failed: -22 [ 1301.536573] ieee802154 phy1 wpan1: encryption failed: -22 23:22:28 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001200050700"/20, @ANYRES32, @ANYBLOB="000000a13900000028001d"], 0x48}}, 0x0) 23:22:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x0, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d7", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x0, 0x0, &(0x7f00000000c0)=0x2, 0x1) [ 1301.991297] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 1302.026581] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 1302.094492] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 23:22:29 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 1302.143170] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 23:22:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x0, 0x0, &(0x7f00000000c0)=0x2, 0x1) 23:22:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:29 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001200050700"/20, @ANYRES32, @ANYBLOB="000000a13900000028001d"], 0x48}}, 0x0) 23:22:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, 0x0, 0x1) [ 1302.393070] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 1302.433177] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 23:22:29 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001200050700"/20, @ANYRES32, @ANYBLOB="000000a13900000028001d"], 0x48}}, 0x0) 23:22:29 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 1302.634125] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 1302.671259] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 23:22:29 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001200050700"/20, @ANYRES32, @ANYBLOB="000000a13900000028001d"], 0x48}}, 0x0) 23:22:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d7", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 1302.851213] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 1302.883589] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 23:22:29 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write(r0, 0x0, 0xfe8d) 23:22:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="0fd00cf4d11987e76f0d31cc9224c1696b4be22f796649c250aab17112e656bbec1ec5a368f03170d98b3469a0ad2994177adb1476e56a25c1ddfce860e1c359d50e78e8f2b522f4d3411a83ce868effb9e3528d8f58ecdd57a67ff231ea48e8b7a25a1253c405901f684436bfd618f427dea77274e57a965cebd1fb9a8a481f5033fdb52f61c080351e7d1cd2f409b6c6b8e47d0b5063a9a3b70daa52f4a79d5412ff99d521a0d338b3d06190e7da9e1a2c2362556663efd183ff0bc868dfd8426d8025b65b8d1f3748d2c2f79374ea63575033e579f910a52859f3afadd1f191b4cb32eb3f10fcb8155a55d1266f56fd9a8f2a14c27e6b6dc3ec697a2c018e04e941efa2e3cf5f91d3db736b60542586d84c00e8ca9b9134fa87fa6a0f7e5ecfd83a0afb228be545d73c8ae3e8ec14582e07be529ef9e0b8a21349047e2bc7dc5a7b333860196ec3c0fcea7aa6ccffba17b48ca0a05a61447a147254efb5669a375fdcb195bd3bb45195b2a67dc4933ead021004cb4e3600e2892d5c0552eebdb73080124efce11180bb836d5529144d035368d7396e2150adc0428a8e8a011c67c5c4496aef80e0a7c0e9cff95be5688bb2999690c61bd83b63e1532f37b4507a0847d6d04cdfeddd03e9962506e639e551a10e4a9602a398c5bde599579611f882a31f21fbcd8a2662c7494a3dc7c0371ee9b4718b793812892354071ecda6c515a53545c3bc59e4d683bd05ef1eef219b04b4b0b9da1bba1b8ff693811ccf7e8764393d1bad6d6a3878886becaa878f16f72f2d842d03fc2547d7aef7edc17770e8d36904e539fe2d9b6c6530e59c0bbf0cf45f24ad2aa3abfeee6cbedcd0c70b85a62788c96e7546a696165820b17c67d942fb570ee666c2a898fc38b0b204516a00363c27c2344c29da869a6a6899cca7667c73bdbe0d681c6530aeff22c6eb451dfa2d42636a308fc9188e43e56ff4551d364846265f99f2d417e11288c29d065e9b21e6841c7122b86c245f93f7ec7c2d5167a9cabfd89d73de445619369b8002cfcbcc2020b497b2ef501e4ef5758df382cb9f8598d0b5bcf1e791d9c0d0f40a5545c32d0873190b2ea538f9c9286a0c9835943f59f09feb9cdd318c7046525f42d0f122ee7c13226b7de47420b16cdd324dc1d6c65ee725595d7e5f52c201373f2a3c425e52f66d4704f48750a184aa52d572a92667a8c76df334cfddfb62efc3bfb6810617165e429245b41cc7f34f41b9bcc4f670b0b6157427f9ec8663fccee09de523f0a591841191dfbac2a309fa16f4cad57e50a8064d77c4e4cd05077fea377dbbf7e3c331306817d6528ce6785b72bd77dd857e7e7f297b454ba6eadb71fd97bc11406f98ab20c08ad3a2d2add222c90d49ce280a5ae116c478ffca29327929864245f29df3925a6c9e72b971f01b7ae1633e263cf16c8514babff8e203ab4646819fae18d64f1d8c5a6685d1701efe90eac74943e3f5b30211fe3b59782272434286c5f1821616dd11559df6457389e8ab62ad7a018fddf7c4d18ed800d7e7398da73263211eb57e3b7773c2b9624ecb82a6fe8b14aaba9df6d6c96d0f2e5680a924adb68ce3566be2b013a99eda709c950eaadf5e62c33b8101306bef2627fc6ef81ca2c0fcb710e3b69180fbe3990b6ac8538872d2084fa2960d0ddf4ff3f771eab6d8ece98284f0c2642c2d15db29b9e650810d002f225cf9b46e41cae8031e749cd79f31a5e31e8ea142e957635a64a93da8495e2411f5d4d80fd4945615372454c275c37be36bde7b3ee7f18692a2a876a09d155946b2bc6ce7b45386ab702d57b57fd6dc7a69d8f541292a0ae03955b78f2a5e12ba93b802a6b7f43a70b2a2336ea276ed9f7e3e50a30243e14ae1b6650a489c4db25d132468c265933e805d52fd9950855284b8545977866fb8ee4a9819f5fade867246ccb986e66bc1e48dd4a3c40e73e207026ffe024f87471f94c08ae818539cbe42f2e39bc0c8edb0b87927c4d28275a85e337e2dc6ec85e4945279211f4f79121af5bbbc3d42eb02d70f587dfa22a9d34ce8e27f89765aa03858aa0dbcc77ee6e08624e2ae1bf3401828e2c6c21df715ac3b6d2a06c058b4d48910ff991d2c461a5d81dfce7a5400f62e4e392818e6b5fecfee049f6ad466df2ba1393aa848e8735e667664ac7e7565d9a609b4ecacd29834c75971cb6331eeacd6defb1b272054b3663ec0e71b20a8ee63afeae9e65c6665d5c88001843edaad8e4fb93a659e4968831c2cc92490d354589ca208eb24178514843c46f67da69a446a1e653f117d9b5705beccf1579c626e69128738edf7183cd7857655892ed0b799771085e1435be7217492cacee48643a1fef665f25b38375625a874505d327bb7a1c946463637345615ff7a2d16f77398d79d8af086ddaf1d0b09c49200632402389718809dbaf810d6091f7e4defe48d6327aa2efa8a24fe534bb101eaf887448afe9ef846172a9352022f50d077490db6aa00e2d79b596578dae51c537fa0204178bb7cc20caf3ef797dbbe1cb7178bbcbe980a4da08b7c528e6664c6e6e7a739d748a5860676924175e9d7cdc64b0784de3ab6c1969cbea11b4cc55e5037c1d3fcdfbb35753a6a1f9639a8929d2251ca9ca6441a874f74a3be6bcc0674f16ef6e8bba890fe39680ae7b723d45c191a4698cf1806bec4820f9e06470f2c8dcd7ccc1bf1f09ecf3112f528f7bc9c722e86178fc431e65d2a03bf738033eecedfeeb1537816c4fb9de96328d2a25bcbcc3cf44eff9a90afbac6cdedc5c530ec6e765d0fd1bc40639589cdee5166a42833761a9f1bf09bbc47981d28b33fd8d7fde100e5ec20dd25e4c740fb697a12bc5ac7ffa6fd2cc545f080d7e7c3a34a98685c30bc1bd8935897a764dcbd2cabfc9b43eb4b0865a48b38b451371416c7c5d3523aa579907182399845ce7e8da8adaac430edf5e0f4317d539929bd60dec5e524b124541443756b39f51b42f4ac8960dabab1de8a2479d9d5f3fc18d434d65cf913851aa281feb4212234d1a6ad7ea65aa2bb53dd5858aa336e19a5d0ab3b15366eb923cb6dfd85692bbfae3572dc78b763298157c5665033963303a44aec2b68ebb6d82cb4038af4274f47d58c8b71e8dad56bfe2b4838e4e0e1cf6ce7c5ea317c05cc9af2956d87b7248a273499fff6af4b07e9f918e80bde561c211e3d9f43fbfce276d7bc31d962eb0c398379d6f346f2412558334b8d3b91599cf6c95e240e46dd34611b5af0fb04fdba16e26f06e72143f987b163a06bf6dd2151ae35325c6be8c25db56141d4d08404fb5429fbfc689f04b470d6854946b87714ed37a86329340c0b88838082eafa34aaeb7c8f2594fcf06da9ee461f126ec195cdcbd8953773ea39637070b1b219d0ebbf931b921dd2ba2efd50428786fbb88e54b77da347425a54eb9a201d45e66c1bb3c0f370257bb9682c9ea0b5f11dff6d34b074961e5ff6922f86e66c3ec5a0c79cb7c80f30d05f7c29a74960f455bcc6fa815aa382666a379353209b04b62c86010c8300940c8b5e75a50c8dff33b6b40216cc11a13ba5b92b2add34d512b9944cc3b6d2bf2dc9d402c0f04ce31ffb0863678746bf090520f61daeb60e33b468c20552730de16ee31be127ddc0ca2da78559cd15b8de845d1d3a308ebd5d814984244fd1785c847fa44d7f6987105cdcf8362ae1e9897c2a99381780b2c1cb346fb4364e6055f951fc095b67458d45cd1347ac4c416d8f4804515223dc3f1abe3011b6239e9c18757117c1a8c5c9e095bf12cec00cae443d689595100614a3653819e86a9828368bd13e334adaa6c43101d77118c539be2fd46694bbf7e5ca88cd0e6a2574a8836f6c047ae38412fa772395ca4d29d2515e304bc97d319b023a6d542315f65fbec2e2c7c23941d461679b387b3c24607a88e4ded1cb3c35a6922cb979f592f9000c095ec011387a5da5bfb4af6cabebe2cd5ef6e83f94b8ab867a4b425db2bd344e58dafd90867a1a7a52f482583fa7d30450a3994c67e8fec7a67b09191da2d79c46291886abde7bbee8c81f4cb4ee3441b17eb06a76c193d6b3eb7d1d220ee2b0752774a8d94fb7949293c27c2c94b615abec045f6400a4283d192ecd903bf541aba4bc4900fd90c9f3636e220c61facdd7b3ec922ccac535bfbb0f37601062b513eddedbc97d29909ce07c119ea533be0e51c01e440f51afae90fd0615b5a6681d1a85a72ab97b9754a5a4a1985ee2e6dfddb52cfd55feb90a3e28e820e3004fae72d35078e92957f2ebf86b5750b3aa5c02e4081fadf014288ea8a0b7dec8a6268493c3e93ba2da42a04f9754888b3092efcbffd6d842f95c88c4df3d0b680c74a757dc95507fa507d5efc4c31cf5c8a279760246b2001c86d6f41665ca0648aa5c3199801e9c01de728caa54c35b03c6235eee996472c8829e9bde7a7ec33601a1cb948a71caf73d3b323d26282ed8cd24dd82db8eb77a9ae506cf5d9b78d2f7d3cac52a92a82a820b2fe7ab1498127bdc337aa7824714ed4335e67e91e09f1b561d73a289a7bd6ce99cf8c0dd3afcee2a6d919c95b29844d32fdc6798f730c76ab806ac8add64f75bdd3f73a5feaab9703d61e64577aba90ac9423eb1d454fea1857bf6ddebbeccd8ff3496642068e54483d9641c4f6170da5691948edc85e8904cbfaee4dff1ec99a76dd9760d9c0cbb408ba9b3c46fe8adc6c440d8f7f7350cd35012d14f668f27d5edb28f6998573e258878988aedfa2bebe62482ded78f64b2b7d7a81a9b5402121976df52ea277b286ece26b1c9ba57681ea455cf656186359669f70a327d320b46ca5c4c222de9e15f4d35f845428098e4fa5b7787b3cbb464fcf6080a6e1c3e4677319fc876911f32ad29594fa58b244c8a83b0de3b9363de5822412fdd0d8fe9d5b2d3921eccc19335365f5aa8e906be06a38daf2362d247e15429452b07505b711dada31cccca1d0751b31a7d26296d7a68e6a94f76b93e5f770e6a0e172dd6a4397eab07ea33b146bb13aa79db0f5f44f81a3355c3204d578eadec42ecebf536c84cebd6a9ae91cfff948e82eaa0bc2380de2ab791636b45244b18158d4f5f2323bfd7d4eb39d0a5108a5aa5b70ff5d0b3de180b2a8f9e72a2ef7dd8f3974337d82c3bda746cd265c7bc422afda2caf73f85796fbb3e12a97000f36a0aefbda62f8562552d860c6eabf067ba411248513369c1ca84c677b0ccdbff1a31445c00f023190029cdfa16fd138fe06333a3107d7a4925a82a9f504a2a37c23236780fe68677029982fc43cbebc3ce78ec096898e9d433e9604b05002d9d95db262d", 0xec1, 0x0, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000fc0)=""/4096, 0x1000, 0x0, 0x0, 0x0) 23:22:30 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:30 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) futex(&(0x7f0000000040), 0x8b, 0x1, 0x0, 0x0, 0x0) 23:22:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000001fc0)=@abs={0x1}, 0x6e) 23:22:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:30 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MODE={0x5}]}}}]}, 0x44}}, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d7", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:30 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:30 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:31 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1f}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @private}}, 0x1c) 23:22:31 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe6476602", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:31 executing program 1: r0 = eventfd2(0x28, 0x1) read$eventfd(r0, &(0x7f0000000040), 0x8) 23:22:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="44e764", 0xffffffffffffff9d, 0x0, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000fc0)=""/4096, 0x1000, 0x0, 0x0, 0x0) 23:22:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MODE={0x5}]}}}]}, 0x44}}, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$alg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0, 0x21}, {&(0x7f0000000180)="f5ad6fe47a1d30df4099a42fca1fe686eab3903b72174e80e9bac68d6242b0cf74f795127f1f7f33a83cc3c40ce3db8bc1c7459e6a9841344fc4b28b675cf21e3c91b31a35477c5bc327c8cd4402571461ff71aa1146dbce4ad3bb81372f9770bfebb51a131d973b6b11873faaa087214bcf33a6c308b39c8fb7f5bf6a", 0x7d}], 0x3}, 0x0) 23:22:31 executing program 2: r0 = socket(0x2, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) 23:22:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47a", 0x75}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:31 executing program 2: pipe2(&(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read$FUSE(r0, &(0x7f0000004f40)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) write$P9_RCREATE(r1, &(0x7f0000007080)={0x18}, 0x18) write$P9_RREADLINK(r1, &(0x7f0000000000)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 23:22:32 executing program 5: r0 = socket(0x2, 0x2, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) 23:22:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 23:22:32 executing program 5: socket(0x2, 0x2, 0x8) 23:22:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MODE={0x5}]}}}]}, 0x44}}, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:32 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_mreq(r0, 0x29, 0x39, 0x0, &(0x7f0000000240)) 23:22:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="0f", 0x1, 0x0, 0x0, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x10040, 0x0, 0x0) 23:22:32 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe6476602", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000fc0)=""/140, 0x8c, 0x0, 0x0, 0x0) sendto$unix(r0, &(0x7f00000000c0)="0f", 0x1, 0x0, 0x0, 0x0) 23:22:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x94dd, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', r0) 23:22:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x3e, 0x0, 0x0, &(0x7f0000000240)=ANY=[], 0x18}, 0x20040004) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:22:33 executing program 2: r0 = socket(0x1, 0x2, 0x0) sendmsg$netlink(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@rights={{0x10}}], 0x10}, 0x0) 23:22:33 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MODE={0x5}]}}}]}, 0x44}}, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x2, 0x0, 0x0) write(r0, 0x0, 0x0) recvfrom$unix(r1, 0x0, 0x5a, 0x18022, 0x0, 0x93) 23:22:33 executing program 5: pipe2(&(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWRITE(r1, &(0x7f00000022c0)={0xb}, 0xb) read$FUSE(r0, &(0x7f0000004f40)={0x2020}, 0x2020) 23:22:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="0f", 0x1, 0x0, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000fc0)=""/4096, 0x1000, 0x0, 0x0, 0x0) 23:22:33 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe6476602", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:33 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 23:22:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:22:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$unix(r0, &(0x7f00000000c0)="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", 0xec1, 0x0, 0x0, 0x0) 23:22:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) getsockname$unix(r0, 0x0, &(0x7f0000000140)) 23:22:33 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000001100)={@local, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}}, 0x0) 23:22:34 executing program 1: r0 = socket(0x2, 0x2, 0x0) bind$unix(r0, 0x0, 0x0) 23:22:34 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="44e764", 0xffffffffffffff9d, 0x0, 0x0, 0x0) 23:22:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000010c0)={&(0x7f0000000100)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}, 0x8000) sendmsg$inet6(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 23:22:34 executing program 5: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 23:22:34 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe6476602", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) creat(&(0x7f0000000000)='./file0\x00', 0x0) bind$unix(r0, &(0x7f0000001fc0)=@file={0x1, './file0\x00'}, 0x6e) 23:22:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) 23:22:34 executing program 4: r0 = socket(0x2, 0xa, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 23:22:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x31}, 0x1f}, 0x1c) 23:22:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00') read$FUSE(r0, 0x0, 0x0) 23:22:34 executing program 0: r0 = socket(0x1, 0x2, 0x0) sendmsg$netlink(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="14000000000000000100000001000000e7"], 0x18}, 0x0) 23:22:34 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000003800)={&(0x7f0000002680)=ANY=[@ANYBLOB="10000000140009"], 0x14}}, 0x0) 23:22:34 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={[], [], @empty}}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000180)=']', 0x1}], 0x1}, 0x0) 23:22:34 executing program 1: r0 = socket(0x2, 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x40000060, 0x0, 0x0) 23:22:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = dup(r0) recvfrom$inet6(r1, 0x0, 0x0, 0x2080, 0x0, 0x0) 23:22:34 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @initdev={0xfe, 0x88, [], 0x0, 0x0}}) 23:22:34 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe64766024c497b6aab", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) getpeername$inet6(r1, 0x0, &(0x7f0000000080)) 23:22:34 executing program 4: r0 = socket(0x1, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000980)='cpuset\x00') sendmsg$netlink(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [r2, r1]}}], 0x18}, 0x0) 23:22:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="44e764", 0xffffffffffffff9d, 0x0, 0x0, 0x0) 23:22:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) sendmsg$inet6(r0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[], 0x18}, 0x41) 23:22:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mbind(&(0x7f00007e0000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x67ed0aad0af51558) 23:22:34 executing program 5: r0 = socket(0x11, 0x2, 0x0) read$alg(r0, &(0x7f0000000040)=""/55, 0x37) 23:22:34 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee", 0x30}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:35 executing program 4: r0 = socket(0x2, 0xa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 23:22:35 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e", 0x1f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:35 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x20}, 0x9}, 0x1c) 23:22:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe64766024c497b6aab", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:35 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) 23:22:35 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 23:22:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x110, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r4 = mq_open(&(0x7f000084dff0)='\xc3A\x98e', 0x0, 0x144, &(0x7f0000000340)={0x0, 0x1, 0x5, 0xfffffffffffffffd}) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000040)={0x0, 0x40, 0x6cf, &(0x7f0000000000)=0x7fff}) r5 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, r5) 23:22:36 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee", 0x30}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) creat(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) 23:22:36 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)) fcntl$lock(r1, 0x26, &(0x7f0000000180)={0x40001}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 23:22:36 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x110, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r4 = mq_open(&(0x7f000084dff0)='\xc3A\x98e', 0x0, 0x144, &(0x7f0000000340)={0x0, 0x1, 0x5, 0xfffffffffffffffd}) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000040)={0x0, 0x40, 0x6cf, &(0x7f0000000000)=0x7fff}) r5 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, r5) 23:22:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x110, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r4 = mq_open(&(0x7f000084dff0)='\xc3A\x98e', 0x0, 0x144, &(0x7f0000000340)={0x0, 0x1, 0x5, 0xfffffffffffffffd}) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000040)={0x0, 0x40, 0x6cf, &(0x7f0000000000)=0x7fff}) r5 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, r5) 23:22:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x40010122, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[], 0x68}}, 0x0) 23:22:36 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x110, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r4 = mq_open(&(0x7f000084dff0)='\xc3A\x98e', 0x0, 0x144, &(0x7f0000000340)={0x0, 0x1, 0x5, 0xfffffffffffffffd}) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000040)={0x0, 0x40, 0x6cf, &(0x7f0000000000)=0x7fff}) r5 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, r5) 23:22:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe64766024c497b6aab", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x110, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r4 = mq_open(&(0x7f000084dff0)='\xc3A\x98e', 0x0, 0x144, &(0x7f0000000340)={0x0, 0x1, 0x5, 0xfffffffffffffffd}) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000040)={0x0, 0x40, 0x6cf, &(0x7f0000000000)=0x7fff}) r5 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, r5) 23:22:36 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='\x94#[,+\x00', 0x0) 23:22:36 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x110, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r4 = mq_open(&(0x7f000084dff0)='\xc3A\x98e', 0x0, 0x144, &(0x7f0000000340)={0x0, 0x1, 0x5, 0xfffffffffffffffd}) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000040)={0x0, 0x40, 0x6cf, &(0x7f0000000000)=0x7fff}) r5 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, r5) 23:22:36 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee", 0x30}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/packet\x00') read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) 23:22:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x110, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r4 = mq_open(&(0x7f000084dff0)='\xc3A\x98e', 0x0, 0x144, &(0x7f0000000340)={0x0, 0x1, 0x5, 0xfffffffffffffffd}) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000040)={0x0, 0x40, 0x6cf, &(0x7f0000000000)=0x7fff}) r5 = inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, r5) 23:22:37 executing program 5: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)) fcntl$lock(r1, 0x26, &(0x7f0000000180)={0x40001, 0x2}) clone(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 23:22:37 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@private1, 0x0, 0x0, 0x3}, 0x20) 23:22:37 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x24, 0x21, 0xf1d}, 0x24}}, 0x0) 23:22:37 executing program 4: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000180)=""/220) 23:22:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b56d47ae225fe156f5b4ffe481267f59742f027ce07169aff95da49b98c0851e7ffe64766024c497b6aab", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:37 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa99f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 23:22:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000040)={'veth0_vlan\x00', @ifru_ivalue}) 23:22:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000b081000418e00000004fcff", 0x58}], 0x1) 23:22:37 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee", 0x30}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 1310.858547] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1310.908455] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 23:22:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) r3 = dup2(r2, r0) getdents64(r3, &(0x7f00000000c0)=""/112, 0x70) 23:22:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 23:22:38 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x8000000010, 0x2, 0x0) write(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r4, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r4, &(0x7f0000001440)="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", 0x156, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r3], 0x1000001bd) 23:22:39 executing program 5: r0 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000080)=""/61) 23:22:39 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000e40000/0x2000)=nil) shmat(0x0, &(0x7f0000642000/0x4000)=nil, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 23:22:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x8000000010, 0x2, 0x0) write(r2, &(0x7f0000000200)="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", 0xfc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r3, &(0x7f0000001440)="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", 0x331, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC], 0x1000001bd) 23:22:39 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') r1 = ioctl$NS_GET_PARENT(r0, 0x5452, 0x400700) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) 23:22:39 executing program 1: r0 = getpgid(0x0) syz_open_procfs$userns(0x0, &(0x7f0000000940)='ns/user\x00') syz_open_procfs$userns(r0, &(0x7f0000001980)='ns/user\x00') 23:22:39 executing program 4: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1cb106e62893230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:22:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x8000000010, 0x2, 0x0) write(r2, &(0x7f0000000200)="fc0000001c000705ab092509b868070002ab087a03000000b8480493210001c0f0020584050000010000000000039815fa2c53c28648000000b9d95662537a00bc000200f0036cdf0db400600033d440003d3baa259a040060b16a482c0a36313012dafd5a32e273fc83ab82d710f74cec18444ef90d475ef8b29d3ef3d92c94170e5bc2c94f61ba2e177313e081bea05d3a021e8ca062914a463ae4f5df77bc4cfd6239ec2a0f0d1bcae5f5502943283f4bb102b2b8f5566791cf190201ded815b2ccd243f395ed94e0ad91bd0733802e0784f2013cd1890058a10000c880ac801fe4af000049f0d4796f0000080548deac279cc4848e3825924509", 0xfc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r3, &(0x7f0000001440)="b762b36f8816b94f5b1aa46a6295abd8a304ad72be0fa841b05306b8ed64a3ab5ddcf13b60042f883283df5fc4d6eb69e6baf3cd6fec1524efb28e082b65f61d0a190433306268351cc69015da6806fb057c975ab96ec72e771fb975397e158167c3d86d649bebda447b8f6fab5c28a05920639731600dd22efb6d33af23089eb381808c996f29e5841c36dfb39c3be4088d6f791221934abb89b14f4090d0aca835ef0228b0206ce0ce4b228e4143b872200a56736eb8c3a5530309cda6f55f84ef2b1f62e73cd99335bbf808e8a54d2c4ce9764b9020ce9418c26cc895d7a9fba102f403cf505f0a2cf461114857b1fd7e537d8fc9933cbc1bee17d63259e9874f1223c9e58691d1e94199a8f5c05c2cb139efee6f3e3fd39188cc20797ec5ad59b6322320973a14ef9971a34df6f8fb52d05b3bad37c3a53e4a1720e5e8a1d3365b1c5547c53fc0bf5b742de5ab917e5e25c3f06acf4f28fa2df3d2b0e195959a34b5512355895d9c4026636cbe9cb9006b74f45eac991a992517fea009a3500496856a162ff88134684eb1cfefaa8a562949b8ece59f582a519b35e5586cfb22064e521f4c87f46a7773db17385ef47c9ad257516b3a221cc602ef6e2f57152f5fbeb4dbf6961d934ba398b75bee8838fe14acc751c8c5578363384b997aa9fe9e794097f6eb2db321452a6d48cc53ee9816997dd146af82a84daea870bb92213fd8bf1aa73d4b35bfe95a6676a248ff97feb48bee5ed73e55326645a1a29e432feffa03d7787b975afa4c40f940402920f75ef4a73f7790f31c469acc11b70bc4223e62f69d8a118bfc67167757c6c6aab905455751f9386faf4dac8f63f331cdaddaaaba2b69cc6590897e89859a430df3c5f96505dd50542d8a06181c79ab3bcb7924e7df1cf9f8e9eee90aef5d44d206727f3a1fab103c93b4a8ecfac48e8959ac21210165e9402c043ce05de8937dc0bd194ec3a7aee0b0f2f1999f22cce9fe6e432cafb5b18c725e180e897778c6911ec2ae24928ac7fac6a1550f6f09c59883d6acd5e4fc363600742fa1081978b19bf09eb274de0261d6fb1af00143f0c0c6baeab214fba4378ef161e2db9d78b24777de4c914e3e8c8f50c5fb92731efae5f165819393375d1b0c92ceef88b97b801bd26c913d03238f24eaf4e1421d23c6ae54b16c6cf205649e4cca900b8953ebd29fb3b97829622fc000fea6d8ea739e8bd7283b3ad117a50d08bb142d21bb1d18e98dbcf299860a084436de507630135c3479f476c1f77a81ff136e49067778b0e88c1d671119cfd68add26b860274d37befbde07846a795f396a58e95179c47c7049fb93dd12dde5d276f81c48cee312a29860e7d4431db18d539f8d41de5d", 0x3d5, 0x0, 0x0, 0x0) 23:22:39 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socket(0x8000000010, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="fc0000001c000705ab092509b868070002ab087a03000000b8480493210001c0f0020584050000010000000000039815fa2c53c28648000000b9d95662537a00bc000200f0036cdf0db400600033d440003d3baa259a040060b16a482c0a36313012dafd5a32e273fc83ab82d710f74cec18444ef90d475ef8b29d3ef3d92c94170e5bc2c94f61ba2e177313e081bea05d3a021e8ca062914a463ae4f5df77bc4cfd6239ec2a0f0d1bcae5f5502943283f4bb102b2b8f5566791cf190201ded815b2ccd243f395ed94e0ad91bd0733802e0784f2013cd1890058a10000c880ac801fe4af000049f0d4796f0000080548deac279cc4848e", 0xf7) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r3, &(0x7f0000001440)="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", 0x2ab, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r2], 0x1000001bd) 23:22:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5421, &(0x7f0000000280)={'wg1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', r0) 23:22:39 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x40085400, 0x400000) 23:22:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x10022, 0x0, 0x0) 23:22:39 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 23:22:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000040)="c300", 0x2, 0x0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 23:22:39 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x8000000010, 0x2, 0x0) write(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r4, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r4, &(0x7f0000001440)="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", 0x156, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r3], 0x1000001bd) 23:22:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x8000000010, 0x2, 0x0) write(r2, &(0x7f0000000200)="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", 0xfc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r3, &(0x7f0000001440)="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", 0x331, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC], 0x1000001bd) 23:22:40 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x8000000010, 0x2, 0x0) write(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r4, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r4, &(0x7f0000001440)="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", 0x156, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r3], 0x1000001bd) 23:22:40 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x8000000010, 0x2, 0x0) write(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r4, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r4, &(0x7f0000001440)="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", 0x156, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r3], 0x1000001bd) 23:22:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='.'], &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0/../file0\x00') 23:22:40 executing program 1: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000080)={0x2}, 0x0) 23:22:40 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x8000000010, 0x2, 0x0) write(r2, &(0x7f0000000200)="fc0000001c000705ab092509b868070002ab087a03000000b8480493210001c0f0020584050000010000000000039815fa2c53c28648000000b9d95662537a00bc000200f0036cdf0db400600033d440003d3baa259a040060b16a482c0a36313012dafd5a32e273fc83ab82d710f74cec18444ef90d475ef8b29d3ef3d92c94170e5bc2c94f61ba2e177313e081bea05d3a021e8ca062914a463ae4f5df77bc4cfd6239ec2a0f0d1bcae5f5502943283f4bb102b2b8f5566791cf190201ded815b2ccd243f395ed94e0ad91bd0733802e0784f2013cd1890058a10000c880ac801fe4af000049f0d4796f0000080548deac279cc4848e3825924509", 0xfc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r3, &(0x7f0000001440)="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", 0x331, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC], 0x1000001bd) 23:22:40 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x8000000010, 0x2, 0x0) write(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r4, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) sendto$inet(r4, &(0x7f0000001440)="b762b36f8816b94f5b1aa46a6295abd8a304ad72be0fa841b05306b8ed64a3ab5ddcf13b60042f883283df5fc4d6eb69e6baf3cd6fec1524efb28e082b65f61d0a190433306268351cc69015da6806fb057c975ab96ec72e771fb975397e158167c3d86d649bebda447b8f6fab5c28a05920639731600dd22efb6d33af23089eb381808c996f29e5841c36dfb39c3be4088d6f791221934abb89b14f4090d0aca835ef0228b0206ce0ce4b228e4143b872200a56736eb8c3a5530309cda6f55f84ef2b1f62e73cd99335bbf808e8a54d2c4ce9764b9020ce9418c26cc895d7a9fba102f403cf505f0a2cf461114857b1fd7e537d8fc9933cbc1bee17d63259e9874f1223c9e58691d1e94199a8f5c05c2cb139efee6f3e3fd39188cc20797ec5ad59b6322320973a14ef9971a34df6f8fb52d05b3bad37c3a53e4a1720e5e8a1d3365b1c5547c53fc0bf5b742de5ab917e5e25c3f06a", 0x156, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r3], 0x1000001bd) 23:22:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000100)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86>\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x01\a\x00\x00\x00\x00\x00\x00\x00\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f)\x7fE\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x01\a\x00\x00\x00\x00\x00\x00\x00\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f)\x7fE\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x01\a\x00\x00\x00\x00\x00\x00\x00\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f)\x7fE\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x01\a\x00\x00\x00\x00\x00\x00\x00\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f)\x7fE\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x01\a\x00\x00\x00\x00\x00\x00\x00\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f)\x7fE\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x01\a\x00\x00\x00\x00\x00\x00\x00\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f)\x7fE\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x01\a\x00\x00\x00\x00\x00\x00\x00\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f)\x7fE0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xffffffff}}, @IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x40}}, 0x0) 23:22:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x210, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x178, 0x1a8, 0x1a8, 0x178, 0x1a8, 0x3, 0x0, {[{{@ip={@loopback, @empty, 0x0, 0x0, 'lo\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "506a598264bdd6fcb66b2f2815b6eb09b93eed4084409a31d330eb5a4123"}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {}, [@common=@unspec=@statistic={{0x38, 'statistic\x00'}, {0x0, 0x1}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x270) sendto$inet(r0, &(0x7f0000000040)="c300", 0x2, 0x0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 23:22:44 executing program 2: setpriority(0x0, 0x0, 0x7) r0 = mq_open(&(0x7f0000000040)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!Tnux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x8}) mq_timedreceive(r0, &(0x7f0000000300)=""/55, 0x37, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 23:22:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xffffffff}}, @IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x40}}, 0x0) 23:22:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x210, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x178, 0x1a8, 0x1a8, 0x178, 0x1a8, 0x3, 0x0, {[{{@ip={@loopback, @empty, 0x0, 0x0, 'lo\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "506a598264bdd6fcb66b2f2815b6eb09b93eed4084409a31d330eb5a4123"}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {}, [@common=@unspec=@statistic={{0x38, 'statistic\x00'}, {0x0, 0x1}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x270) sendto$inet(r0, &(0x7f0000000040)="c300", 0x2, 0x0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 23:22:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x2, 0x1, 0x801}, 0x14}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x6c, 0xb, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0xfffffffffffffe43, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x4}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x24}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x200008d1}, 0x4) 23:22:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xffffffff}}, @IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x40}}, 0x0) 23:22:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x210, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x178, 0x1a8, 0x1a8, 0x178, 0x1a8, 0x3, 0x0, {[{{@ip={@loopback, @empty, 0x0, 0x0, 'lo\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "506a598264bdd6fcb66b2f2815b6eb09b93eed4084409a31d330eb5a4123"}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {}, [@common=@unspec=@statistic={{0x38, 'statistic\x00'}, {0x0, 0x1}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x270) sendto$inet(r0, &(0x7f0000000040)="c300", 0x2, 0x0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 23:22:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000001bc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000340)={0xec4, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_CSA_IES={0xea4, 0xb9, 0x0, 0x1, [@beacon_params=[@NL80211_ATTR_PROBE_RESP={0x319, 0x91, "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"}, @NL80211_ATTR_FTM_RESPONDER={0x18c, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x15, 0x2, "2699fb25917b125c67ccf95f27a107ecf3"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x11, 0x2, "ba68e07eb6fdebd39f16786ca7"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x35, 0x3, "0d79caab101527716686839ef3ef3660ad0a39b89990db543c5e717aab2d890553207dfff6ebdb2af425cfdbf189aeb5a9"}, @NL80211_FTM_RESP_ATTR_LCI={0xd1, 0x2, "5b462d7edb681c543bc9d830dfafad2d4724d542dcb5d65d2c91fbaca53c789276e5226bbabfe586818e5b46cdc558df9546791b95da3d578c077805bb7d2263c660c818b063a5f7068c1f3281631ef670424302729140dfea599eff88f00da558c1cb6f4b5bb8bb379c99526914829ab8f1680a6e43ffcb22a942f6b062e5f6edf97a822803f8ea9fe04c569d54fe273ce388667e289c613cc60407752422746ff65f00e5e6cfec221fd1a25ad6e492911ae17b2497e174929baae084dfe5e2c5f38891d403f52939ea93f815"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x41, 0x2, "99f94a98a66b91088914a9535e5f280dee4c8c3ced071f8b3a8d963289912c72a9b9b4ed3cac88b653b588330fdd9645426d0f7656093516473b9cdf07"}]}, @NL80211_ATTR_IE={0x33, 0x2a, [@peer_mgmt={0x75, 0x16, {0x0, 0x0, @val, @void, @val="ee6567a1e3e9c59f2fd0687a116f355e"}}, @rann={0x7e, 0x15}]}, @NL80211_ATTR_BEACON_HEAD={0x2c9, 0xe, {@with_ht={{{}, {}, @device_b, @device_a, @random="5df48d91b8ae"}}, 0x0, @random, 0x0, @void, @void, @val={0x3, 0x1}, @void, @void, @val={0x5, 0x77, {0x0, 0x0, 0x0, "6c364c67f097d16b851fe37cacbeaf1456b8792041e4da6eaa58d1148ec046e6d771f1e06683dde3ee54a93f8c89fbaae52fbc39a8395328c21a6c9c0bb277185a8d70bfda4f4ee579916053d202ccc688d32513a5ff234a759c8a418337b07e07ce9ccba83d927d5ae543269aee701a6ca4a821"}}, @void, @void, @val={0x3c, 0x4}, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @void, @void, [{0xdd, 0xfc, "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"}, {0xdd, 0xe7, "4f795bb99ebfc62fb4677df36a40627d05445b6b3ba5bd382afce641be52ccb1396bba20656d3c77fde81d1c1ce0ae54f615ff976771857dc0274341f2b697a4dca61887f589d6876a70f4aea31e4d331fbf48cabed7b9980eb21786a2fbc1bb9befb56701b10a0c911585ca158ce1621b38711fd7a2b45b79a051d39ba26f06bee4fb5da0d8d3d363445568fb95b24a20364f465b23f2a8f4a7df7e0ede2aa7b4500e6d30972065c640997c70216449ee3f877915e488dd0a85a91e1cc2c8a07acf390d36e13b0657d02f82ce6b56cd1722ee3bed825b8c1453bd842c2d1b2c519a3cc1b140db"}, {0xdd, 0xe, "b5f958bd3a832d5c7e5bbc3863cf"}]}}, @NL80211_ATTR_PROBE_RESP={0x181, 0x91, "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"}, @NL80211_ATTR_BEACON_HEAD={0x241, 0xe, {@wo_ht={{}, {}, @device_a, @device_b}, 0x0, @random, 0x0, @val={0x0, 0xa, @random="83cd7383d7488301c6ba"}, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @val={0x5, 0x7d, {0x0, 0x0, 0x0, "de653ca7c1c3f04461a95aeb3b894361646a5d6bdbcf6c9af70981144f2d5b3569e0d585a64599853a56ac52f530b683831a457f2b8005145830d3173d40c0840e771198cc77a8e83a0872bd2152852924925bbdf0e8ecf0f933fddab03bc302fda4885250ba28ef034291caa862908109a8af100e760e040a2a"}}, @void, @val={0x2a, 0x1}, @void, @void, @val={0x72, 0x6}, @void, @void, [{0xdd, 0xbe, "1707a602450e1b2b73f01bb13c5b39f3a3e435d36c24d7aa123ab8151b8e87bc39da7a9a742c63f78432c42797c8b20d73f42eb1234488b79c219dbd0bef14dd611876ab3050b54b4a1afd03036bbdcb9a5781c8ec5c16b40cff4f692d9892487898ace0ace8d1fc10608d37f361b4f85510112e22d9dbc4aba461c31f29a32bc79e9c0f0ce209a7463a098b88b90f3ae32d16e1ef4da2c02b9de36436a95b5e88e33c8bd049daa1859bce175485a1b4234a98b8c6b42397b79477680d7b"}, {0xdd, 0xb6, "805a4c52f1c062956bd56bca4c6a92e67f24501887cc6bb415c2bc8b9b50d4890e7b8153f53a1a49256f13dda7e6c1d56eda5568ac1f082faba4700104762c5210266871a565221129e341e9a698816ed781a3fc4e621c33b0b91354dd474dcdd663e0f212f96507b7e18454660f25083c72e78ce8c4d1369135713bdc72fc0edbe57fc682412d76ff7a05572a35a864a41691e266252ce8b46e0de7e40cd8bdcb123a529c46afe53d3d97f85c06ff5108dcff283211"}]}}, @NL80211_ATTR_BEACON_HEAD={0x2c5, 0xe, {@with_ht={{{}, {}, @broadcast, @device_b, @random="2c7dc15b8487"}}, 0x0, @default, 0x0, @void, @void, @val={0x3, 0x1}, @void, @void, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @void, @void, @val={0x71, 0x7}, @void, [{0xdd, 0x66, "59267f193fdacca3502c8b2a956b44056cd9c14959aaedc114b87c8104baae8b3562c9d9289823290c5ab99db2c53a83e8337503456ef3dd038993766783d6b89264f577a35717193c88c20758c327d1a00f318982728842b1d43de54b0482be14067696ae03"}, {0xdd, 0x67, "345e7b4d4b997c29f85bdab43eee61f4ab4a85055e80cfcfef312fa35e901af31d8cc892132a21fd032ca363fdd2351dc9817320d4d21de2448cff0ee86f8a53105cd116813240f62e5004df6860e7de0cb2face20407fbd5e0bd77764405c2f6346031211cff4"}, {0xdd, 0x7a, "3c884ad8609466c285441e5103933ea510643fb8e61d4a2ae935c6a0996ad3c0069e2431aea3aa031ac448d616b988af6ea58620d4919258904f10cb22a7bf36a5217c4cb42f38f05d6026a1b640484bbd5734906c8797faa9f70435b3e26098713dcdaeb50c7280e6856634476acc3f4dc111812e2fa0cf435b"}, {0xdd, 0xcc, "b1ee6bf5c9ac3317416f99fb87379838dfdcf4e7489263fd357a3cd6f5192ef57410cdf6432dde19cb799c09b8cc30623461a3714dc9551adeb507ce0d55c44c31fe19f09adcee300afd65ef622dc0d89d8e308e1a768ccd973d69e1941cc9aff04d2bf170c603c1e027176d610622708c97ff61db5f6dbe8fa3e6739638b986568e79872c0587140e5671be5e1cbb4d7f1188777506a2edbf6fcf03e0f9f31a06f0010d25a240d7828bcb40470af2827fdccda94235eab69431c40e98877b99d1bd75053381618edf795a44"}, {0xdd, 0x62, "6c00217212a32ca80657ac4e630af3b9dbe5245a7b4fd6e036314ebb97654e8562db678fe52147730a550a03180388ccdfb08ca5ef0bb4b0008d5ae7282df9f81a953008abcf96508443cd992f67cb3c0411a1254e92355478b6b1fc4190a3a46358"}]}}, @NL80211_ATTR_BEACON_TAIL={0x65, 0xf, [@sec_chan_ofs={0x3e, 0x1}, @rann={0x7e, 0x15, {{}, 0x0, 0x0, @broadcast}}, @tim={0x5, 0x45, {0x0, 0x0, 0x0, "b8fa834c69e772b49fc9c0626ad929ecd21608887588bd1de6bd207a329a1e04d2893db951abb4ec75473bbfb741e3f0d8b316d55e92ef10f5952d93e8df5ce1c279"}}]}]]}]}, 0xec4}}, 0x0) 23:22:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x210, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x178, 0x1a8, 0x1a8, 0x178, 0x1a8, 0x3, 0x0, {[{{@ip={@loopback, @empty, 0x0, 0x0, 'lo\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "506a598264bdd6fcb66b2f2815b6eb09b93eed4084409a31d330eb5a4123"}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {}, [@common=@unspec=@statistic={{0x38, 'statistic\x00'}, {0x0, 0x1}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x270) sendto$inet(r0, &(0x7f0000000040)="c300", 0x2, 0x0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 23:22:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @timestamp, @sack_perm, @window], 0x4) 23:22:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xffffffff}}, @IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x40}}, 0x0) [ 1318.332754] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 23:22:45 executing program 0: setpriority(0x0, 0x0, 0x7) r0 = mq_open(&(0x7f0000000040)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!Tnux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x8}) mq_timedreceive(r0, &(0x7f0000000300)=""/55, 0x37, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 23:22:45 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0xb, r0, 0xffffffffffffffff, 0xee00) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x9, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, r5}) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) dup2(r1, r2) 23:22:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, 0x0, 0x1, 0x0, 0x0, {}, [""]}, 0x1c}}, 0x0) 23:22:45 executing program 4: io_setup(0x7ef7, &(0x7f0000000500)=0x0) io_getevents(r0, 0x4, 0x0, 0x0, 0x0) 23:22:45 executing program 1: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0xfffffffffffffea2) [ 1318.674230] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 23:22:45 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x410502, 0x0) 23:22:45 executing program 5: mq_open(&(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0, &(0x7f0000000080)) 23:22:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000d80)={'team0\x00'}) 23:22:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10, 0x0}, 0x24008010) 23:22:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup2(r2, r0) getdents64(r3, &(0x7f00000000c0)=""/112, 0x70) 23:22:45 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000100)=""/189, 0xbd) 23:22:45 executing program 2: futex(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0) clock_getres(0x0, &(0x7f0000000100)) 23:22:45 executing program 4: r0 = gettid() ioprio_get$pid(0x3, r0) 23:22:45 executing program 5: mq_open(&(0x7f0000000000)='^+\'){\x00', 0x40, 0x0, 0x0) 23:22:45 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0x0, @local}, @nl=@unspec}) 23:22:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) close(r1) 23:22:46 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/bsg\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 23:22:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='.'], &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000180)='./file0/../file0\x00', 0x0) 23:22:46 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/bsg\x00', 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00', r0) 23:22:46 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='(@\'\'&!-{\x00', 0x0) 23:22:46 executing program 5: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000080), 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 23:22:46 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800b43, 0x0) 23:22:46 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup2(r2, r0) getdents64(r3, &(0x7f00000000c0)=""/112, 0x70) 23:22:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) close(r1) 23:22:46 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) 23:22:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup2(r2, r0) getdents64(r3, &(0x7f00000000c0)=""/112, 0x70) 23:22:46 executing program 5: socketpair(0x0, 0x80f, 0x0, 0x0) 23:22:47 executing program 0: rt_sigaction(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000200)) 23:22:47 executing program 5: sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) 23:22:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) close(r1) 23:22:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x210, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x178, 0x1a8, 0x1a8, 0x178, 0x1a8, 0x3, 0x0, {[{{@ip={@private, @empty, 0x0, 0x0, 'lo\x00', 'veth0_to_hsr\x00', {0xff}}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "506a598264bdd6fcb66b2f2815b6eb09b93eed4084409a31d330eb5a4123"}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {}, [@common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a2) sendto$inet(r0, &(0x7f0000000040)="c300", 0x2, 0x0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 23:22:47 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 23:22:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000b80)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @tipc=@name, @ax25={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}}) 23:22:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) close(r1) 23:22:47 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup2(r2, r0) getdents64(r3, &(0x7f00000000c0)=""/112, 0x70) 23:22:47 executing program 0: setpriority(0x0, 0x0, 0x7) unshare(0x8000000) r0 = mq_open(&(0x7f0000000040)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!Tnux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x8}) mq_timedreceive(r0, &(0x7f0000000300)=""/55, 0x37, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/58, 0x3a, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 23:22:47 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2a8880, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = epoll_create1(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) poll(&(0x7f0000000500)=[{r0}, {r2}, {r3}], 0x3, 0x0) 23:22:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x9bd0, 0x0) 23:22:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup2(r2, r0) getdents64(r3, &(0x7f00000000c0)=""/112, 0x70) 23:22:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x2a0, 0xb0, 0x0, 0xb0, 0x0, 0xb0, 0x208, 0x1a8, 0x1a8, 0x208, 0x1a8, 0x3, 0x0, {[{{@ip={@loopback, @empty, 0x0, 0x0, 'lo\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "506a598264bdd6fcb66b2f2815b6eb09b93eed4084409a31d330eb5a4123"}}, {{@uncond, 0x0, 0x138, 0x158, 0x0, {}, [@common=@unspec=@conntrack3={{0xc8, 'conntrack\x00'}, {{@ipv6=@private0, [], @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], @ipv4, [], @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x300) 23:22:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x9bd0, 0x0) 23:22:47 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000100)={0x0, "5ab07f490cf050a58ea16a1ed48366a4796f0cde7c49c01e8969203d875bd26dff5548f6ce374761d5d4e16778cc75ff52cad8df5a3dd6f915801d1beec956ca"}, 0x48, r0) keyctl$revoke(0x3, r1) 23:22:47 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2a8880, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = epoll_create1(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) poll(&(0x7f0000000500)=[{r0}, {r2}, {r3}], 0x3, 0x0) 23:22:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x9bd0, 0x0) 23:22:48 executing program 2: futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140), 0x0, 0x2) 23:22:48 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2a8880, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = epoll_create1(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) poll(&(0x7f0000000500)=[{r0}, {r2}, {r3}], 0x3, 0x0) 23:22:48 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup2(r2, r0) getdents64(r3, &(0x7f00000000c0)=""/112, 0x70) 23:22:48 executing program 0: setpriority(0x0, 0x0, 0x7) unshare(0x8000000) r0 = mq_open(&(0x7f0000000040)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!Tnux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x8}) mq_timedreceive(r0, &(0x7f0000000300)=""/55, 0x37, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/58, 0x3a, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 23:22:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x9bd0, 0x0) 23:22:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400060000000000ffffffff00000000000000001400020000000000000000000000000000000001"], 0x40}}, 0x0) 23:22:48 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2a8880, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = epoll_create1(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) poll(&(0x7f0000000500)=[{r0}, {r2}, {r3}], 0x3, 0x0) 23:22:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup2(r2, r0) getdents64(r3, &(0x7f00000000c0)=""/112, 0x70) 23:22:48 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 23:22:48 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 23:22:48 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 23:22:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 23:22:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x210, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x178, 0x1a8, 0x1a8, 0x178, 0x1a8, 0x3, 0x0, {[{{@ip={@private, @empty, 0x0, 0x0, 'lo\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "506a598264bdd6fcb66b2f2815b6eb09b93eed4084409a31d330eb5a4123"}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {}, [@common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a2) sendto$inet(r0, &(0x7f0000000040)="c300", 0x2, 0x0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 23:22:48 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 23:22:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) 23:22:49 executing program 0: setpriority(0x0, 0x0, 0x7) unshare(0x8000000) r0 = mq_open(&(0x7f0000000040)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!Tnux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x8}) mq_timedreceive(r0, &(0x7f0000000300)=""/55, 0x37, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/58, 0x3a, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 23:22:49 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 23:22:49 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) 23:22:49 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 23:22:49 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x102, 0x899, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0xe) 23:22:49 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0xb, r0, 0xffffffffffffffff, 0xee00) 23:22:49 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 23:22:49 executing program 2: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x3ff5fcd793753a06) 23:22:49 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 23:22:49 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 23:22:49 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000180)="ea470e177325eb1bf358f2ef68d72208b152a066ebdeb5743c62eba9503381ade22c38e04871bd84c4e1849bda365029d07fb6f5c857d60b7d1d87aca0b4e44106456eb95b6c5a6f41c6b76ce8c355d08a0e0a0118af04c8", 0x58) 23:22:49 executing program 2: rt_sigaction(0x5, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000200)) 23:22:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000040)={'bond_slave_0\x00', @ifru_hwaddr=@local}) 23:22:50 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 23:22:50 executing program 1: mq_open(&(0x7f0000000000)='^+\'){\x00', 0x40, 0x0, &(0x7f0000000040)) 23:22:50 executing program 4: getgroups(0x1, &(0x7f0000000040)=[0x0]) 23:22:50 executing program 0: setpriority(0x0, 0x0, 0x7) unshare(0x8000000) r0 = mq_open(&(0x7f0000000040)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!Tnux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x8}) mq_timedreceive(r0, &(0x7f0000000300)=""/55, 0x37, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/58, 0x3a, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 23:22:50 executing program 5: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000000)={0x0, 0x3938700}) 23:22:50 executing program 2: getcwd(&(0x7f0000000080)=""/178, 0xb2) 23:22:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) 23:22:50 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='pagemap\x00') read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 23:22:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) close(r0) 23:22:50 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x2300, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000380)={0x0, 0x0, {0x1c, 0x2a, 0x7, 0x3, 0x5, 0x3, 0x6, 0x29, 0xffffffffffffffff}}) preadv(r2, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/89, 0x59}], 0x1, 0xd80a, 0xb5e6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/171, 0xab}, {&(0x7f0000000180)=""/32, 0x20}], 0x2, 0x101, 0x3) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r4, &(0x7f0000000040)={0x2, 0x40, @remote}, 0x10) getdents64(r3, 0x0, 0x0) 23:22:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000380)='ns/ipc\x00') 23:22:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x40}}, 0x0) 23:22:51 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x5411, 0x0) 23:22:51 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r0, 0x10001) 23:22:51 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) 23:22:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:22:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x9}]}) 23:22:51 executing program 2: rt_sigaction(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000200)) 23:22:51 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/autofs\x00', 0xc0, 0x0) 23:22:51 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0xca042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) 23:22:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002980)=[{{&(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10, 0x0, 0x0, &(0x7f0000002440)=[@ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x3, [{0x0, 0x2}]}, @cipso={0x86, 0x6}]}}}], 0x20}}], 0x1, 0x0) 23:22:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl0\x00', 0x0}) 23:22:51 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, &(0x7f0000000040)) 23:22:51 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x1, 0x2) syz_open_procfs(0x0, &(0x7f0000000680)='net/if_inet6\x00') openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x1ff}, 0x0, 0x0) 23:22:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x2300, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000380)={0x0, 0x0, {0x1c, 0x2a, 0x7, 0x3, 0x5, 0x3, 0x6, 0x29, 0xffffffffffffffff}}) preadv(r2, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/89, 0x59}], 0x1, 0xd80a, 0xb5e6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/171, 0xab}, {&(0x7f0000000180)=""/32, 0x20}], 0x2, 0x101, 0x3) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r4, &(0x7f0000000040)={0x2, 0x40, @remote}, 0x10) getdents64(r3, 0x0, 0x0) 23:22:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000880)={0x0, 0x0, @ioapic={0x0, 0x200, 0xfff}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000020000000fb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:22:52 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@union, @enum, @int]}, {0x0, [0x0]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x33) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 23:22:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000280)=ANY=[@ANYBLOB="0395"]) 23:22:52 executing program 2: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000040)) 23:22:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x128) 23:22:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x38) 23:22:52 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 23:22:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c0, 0xd0, 0x0, 0x1a0, 0x1a0, 0x400, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@rand_addr=' \x01\x00', @mcast2, [], [], 'batadv_slave_0\x00', 'batadv0\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00', 0x0, {0x2}}}, {{@ipv6={@private0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'erspan0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@unspec=@mac={{0x30, 'mac\x00'}, {@local}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@loopback}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@ipv4={[], [], @local}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) 23:22:52 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union, @enum]}, {0x0, [0x0]}}, 0x0, 0x33}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x33) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 23:22:52 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x74, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x64, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 1325.614609] x_tables: duplicate underflow at hook 1 23:22:52 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x1, 0x2) syz_open_procfs(0x0, &(0x7f0000000680)='net/if_inet6\x00') openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x1ff}, 0x0, 0x0) 23:22:52 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x2300, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000380)={0x0, 0x0, {0x1c, 0x2a, 0x7, 0x3, 0x5, 0x3, 0x6, 0x29, 0xffffffffffffffff}}) preadv(r2, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/89, 0x59}], 0x1, 0xd80a, 0xb5e6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/171, 0xab}, {&(0x7f0000000180)=""/32, 0x20}], 0x2, 0x101, 0x3) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r4, &(0x7f0000000040)={0x2, 0x40, @remote}, 0x10) getdents64(r3, 0x0, 0x0) 23:22:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@resize={'resize'}}, {@commit={'commit'}}, {@usrjquota_file='usrjquota=syz'}]}) 23:22:55 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@union, @enum, @int]}, {0x0, [0x0]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x33) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 23:22:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) 23:22:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0xa4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x74, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x64, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x0) 23:22:55 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x1, 0x2) syz_open_procfs(0x0, &(0x7f0000000680)='net/if_inet6\x00') openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x1ff}, 0x0, 0x0) 23:22:55 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x2300, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000380)={0x0, 0x0, {0x1c, 0x2a, 0x7, 0x3, 0x5, 0x3, 0x6, 0x29, 0xffffffffffffffff}}) preadv(r2, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/89, 0x59}], 0x1, 0xd80a, 0xb5e6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/171, 0xab}, {&(0x7f0000000180)=""/32, 0x20}], 0x2, 0x101, 0x3) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r4, &(0x7f0000000040)={0x2, 0x40, @remote}, 0x10) getdents64(r3, 0x0, 0x0) 23:22:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1291e6", "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"}}, 0x110) 23:22:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 23:22:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union, @enum]}, {0x0, [0x0]}}, 0x0, 0x33}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x33) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 23:22:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000020000000fb], 0x100000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f00000002c0)="0f20e06635200000000f22e0dfd50f2299670f6b933d00c0fe0f01c50f06ba4300b000ee66f20f0766b84f4a00000f23d80f21f86635800000400f23f80f07", 0x3f}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) SeaBIOS (version 1.8.2-google) Total RAM Size = 0x0000000200000000 = 8192 MiB CPUs found: 2 Max CPUs supported: 2 SeaBIOS (version 1.8.2-google) Machine UUID 6a34b5d0-f2eb-fe05-644c-51fd7bbd30d4 found virtio-scsi at 0:3 virtio-scsi vendor='Google' product='PersistentDisk' rev='1' type=0 removable=0 virtio-scsi blksize=512 sectors=4194304 = 2048 MiB drive 0x000f2430: PCHS=0/0/0 translation=lba LCHS=520/128/63 s=4194304 Sending Seabios boot VM event. Booting from Hard Disk 0... early console in extract_kernel input_data: 0x000000000a2302e9 input_len: 0x0000000003bd1518 output: 0x0000000001000000 output_len: 0x000000000ba36b28 kernel_total_size: 0x000000000ce26000 trampoline_32bit: 0x000000000009d000 Decompressing Linux... Parsing ELF... done. Booting the kernel. [ 0.000000] Linux version 4.19.181-syzkaller (syzkaller@syzkaller) (gcc version 10.2.1 20210110 (Debian 10.2.1-6)) #0 SMP PREEMPT now [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native net.ifnames=0 sysctl.kernel.hung_task_all_cpu_backtrace=1 [ 0.000000] KERNEL supported cpus: [ 0.000000] Intel GenuineIntel [ 0.000000] AMD AuthenticAMD [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000bfffcfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000bfffd000-0x00000000bfffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fffbc000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable [ 0.000000] bootconsole [earlyser0] enabled [ 0.000000] ERROR: earlyprintk= earlyser already used [ 0.000000] ERROR: earlyprintk= earlyser already used [ 0.000000] nopcid: PCID feature disabled [ 0.000000] Malformed early option 'vsyscall' [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] SMBIOS 2.4 present. [ 0.000000] DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 0.000000] Hypervisor detected: KVM [ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00 [ 0.000006] kvm-clock: cpu 0, msr c65e001, primary cpu clock [ 0.000006] kvm-clock: using sched offset of 4911562213 cycles [ 0.001278] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [ 0.005038] tsc: Detected 2300.000 MHz processor [ 0.010848] last_pfn = 0x240000 max_arch_pfn = 0x400000000 [ 0.012778] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.014451] last_pfn = 0xbfffd max_arch_pfn = 0x400000000 [ 0.021457] found SMP MP-table at [mem 0x000f26f0-0x000f26ff] [ 0.022991] Using GB pages for direct mapping [ 0.026562] ACPI: Early table checksum verification disabled [ 0.028716] ACPI: RSDP 0x00000000000F2470 000014 (v00 Google) [ 0.029838] ACPI: RSDT 0x00000000BFFFFFA0 000038 (v01 Google GOOGRSDT 00000001 GOOG 00000001) [ 0.032474] ACPI: FACP 0x00000000BFFFF340 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) [ 0.035040] ACPI: DSDT 0x00000000BFFFDA80 0018BA (v01 Google GOOGDSDT 00000001 GOOG 00000001) [ 0.037136] ACPI: FACS 0x00000000BFFFDA40 000040 [ 0.038066] ACPI: FACS 0x00000000BFFFDA40 000040 [ 0.038889] ACPI: SRAT 0x00000000BFFFFE70 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) [ 0.040589] ACPI: APIC 0x00000000BFFFFDC0 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) [ 0.042122] ACPI: SSDT 0x00000000BFFFF440 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) [ 0.043965] ACPI: WAET 0x00000000BFFFFE40 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) [ 0.046391] SRAT: PXM 0 -> APIC 0x00 -> Node 0 [ 0.047236] SRAT: PXM 0 -> APIC 0x01 -> Node 0 [ 0.048188] ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] [ 0.049053] ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] [ 0.050203] ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x23fffffff] [ 0.051503] NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] [ 0.053073] NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x23fffffff] -> [mem 0x00000000-0x23fffffff] [ 0.055802] Faking node 0 at [mem 0x0000000000000000-0x000000013fffffff] (5120MB) [ 0.057914] Faking node 1 at [mem 0x0000000140000000-0x000000023fffffff] (4096MB) [ 0.060576] NODE_DATA(0) allocated [mem 0x13fffb000-0x13fffffff] [ 0.062522] NODE_DATA(1) allocated [mem 0x23fff8000-0x23fffcfff] [ 0.122039] Zone ranges: [ 0.122606] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.124329] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.125793] Normal [mem 0x0000000100000000-0x000000023fffffff] [ 0.127019] Device empty [ 0.127599] Movable zone start for each node [ 0.128357] Early memory node ranges [ 0.129333] node 0: [mem 0x0000000000001000-0x000000000009efff] [ 0.131211] node 0: [mem 0x0000000000100000-0x00000000bfffcfff] [ 0.133037] node 0: [mem 0x0000000100000000-0x000000013fffffff] [ 0.134331] node 1: [mem 0x0000000140000000-0x000000023fffffff] [ 0.135465] Zeroed struct page in unavailable ranges: 101 pages [ 0.135472] Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] [ 0.195060] Initmem setup node 1 [mem 0x0000000140000000-0x000000023fffffff] [ 0.686049] kasan: KernelAddressSanitizer initialized [ 0.688497] ACPI: PM-Timer IO Port: 0xb008 [ 0.689487] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [ 0.691349] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 [ 0.693749] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [ 0.694962] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.697016] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [ 0.700649] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [ 0.703178] Using ACPI (MADT) for SMP configuration information [ 0.705269] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.707633] PM: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.709458] PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] [ 0.711398] PM: Registered nosave memory: [mem 0x000a0000-0x000effff] [ 0.712343] PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] [ 0.713388] PM: Registered nosave memory: [mem 0xbfffd000-0xbfffffff] [ 0.714608] PM: Registered nosave memory: [mem 0xc0000000-0xfffbbfff] [ 0.717304] PM: Registered nosave memory: [mem 0xfffbc000-0xffffffff] [ 0.718852] [mem 0xc0000000-0xfffbbfff] available for PCI devices [ 0.719954] Booting paravirtualized kernel on KVM [ 0.720971] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns [ 2.251106] random: get_random_bytes called from start_kernel+0x10b/0x911 with crng_init=0 [ 2.253665] setup_percpu: NR_CPUS:8 nr_cpumask_bits:8 nr_cpu_ids:2 nr_node_ids:2 [ 2.256905] percpu: Embedded 54 pages/cpu s182664 r8192 d30328 u1048576 [ 2.258365] kvm-stealtime: cpu 0, msr ba01e400 [ 2.259434] PV qspinlock hash table entries: 256 (order: 0, 4096 bytes) [ 2.261771] Built 2 zonelists, mobility grouping on. Total pages: 2064262 [ 2.264000] Policy zone: Normal [ 2.266035] Kernel command line: earlyprintk=serial oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400 net.ifnames=0 sysctl.kernel.hung_task_all_cpu_backtrace=1 ima_policy=tcb watchdog_thresh=55 workqueue.watchdog_thresh=140 kvm-intel.nested=1 nf-conntrack-ftp.ports=20000 nf-conntrack-tftp.ports=20000 nf-conntrack-sip.ports=20000 nf-conntrack-irc.ports=20000 nf-conntrack-sane.ports=20000 vivid.n_devs=16 vivid.multiplanar=1,2,1,2,1,2,1,2,1,2,1,2,1,2,1,2 netrom.nr_ndevs=16 rose.rose_ndevs=16 spec_store_bypass_disable=prctl numa=fake=2 nopcid dummy_hcd.num=8 binder.debug_mask=0 rcupdate.rcu_expedited=1 BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native net.ifnames=0 sysctl.kernel.hung_task_all_cpu_backtrace=1 [ 3.102931] Memory: 6904308K/8388204K available (118812K kernel code, 21038K rwdata, 24204K rodata, 2916K init, 24360K bss, 1483896K reserved, 0K cma-reserved) [ 3.114845] Running RCU self tests [ 3.116085] rcu: Preemptible hierarchical RCU implementation. [ 3.117165] rcu: RCU lockdep checking is enabled. [ 3.118096] rcu: RCU restricting CPUs from NR_CPUS=8 to nr_cpu_ids=2. [ 3.119606] rcu: RCU callback double-/use-after-free debug enabled. [ 3.121541] rcu: RCU debug extended QS entry/exit. [ 3.122401] All grace periods are expedited (rcu_expedited). [ 3.123484] Tasks RCU enabled. [ 3.123940] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [ 3.133942] NR_IRQS: 4352, nr_irqs: 440, preallocated irqs: 16 [ 3.138884] Console: colour VGA+ 80x25 [ 3.140130] console [ttyS0] enabled [ 3.140130] console [ttyS0] enabled [ 3.141922] bootconsole [earlyser0] disabled [ 3.141922] bootconsole [earlyser0] disabled [ 3.145512] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [ 3.148672] ... MAX_LOCKDEP_SUBCLASSES: 8 [ 3.149843] ... MAX_LOCK_DEPTH: 48 [ 3.151422] ... MAX_LOCKDEP_KEYS: 8191 [ 3.152894] ... CLASSHASH_SIZE: 4096 [ 3.154246] ... MAX_LOCKDEP_ENTRIES: 32768 [ 3.155377] ... MAX_LOCKDEP_CHAINS: 65536 [ 3.156740] ... CHAINHASH_SIZE: 32768 [ 3.157917] memory used by lock dependency info: 7391 kB [ 3.159406] per task-struct memory footprint: 1920 bytes [ 3.163037] mempolicy: Enabling automatic NUMA balancing. Configure with numa_balancing= or the kernel.numa_balancing sysctl [ 3.166771] ACPI: Core revision 20180810 [ 3.169639] APIC: Switch to symmetric I/O mode setup [ 3.175174] ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 [ 3.177921] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns [ 3.183163] Calibrating delay loop (skipped) preset value.. 4600.00 BogoMIPS (lpj=23000000) [ 3.186513] pid_max: default: 32768 minimum: 301 [ 3.189125] Security Framework initialized [ 3.193155] Yama: becoming mindful. [ 3.195003] AppArmor: AppArmor initialized [ 3.203569] Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes) [ 3.210586] Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes) [ 3.213443] Mount-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 3.215828] Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 3.223499] Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 [ 3.226538] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 [ 3.228375] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 3.231214] Spectre V2 : Spectre mitigation: kernel not compiled with retpoline; no mitigation available! [ 3.231250] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl [ 3.234752] MDS: Mitigation: Clear CPU buffers [ 3.236653] Freeing SMP alternatives memory: 96K [ 3.361082] smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) [ 3.363113] Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. [ 3.363113] rcu: Hierarchical SRCU implementation. [ 3.366579] NMI watchdog: Perf NMI watchdog permanently disabled [ 3.369675] smp: Bringing up secondary CPUs ... [ 3.373674] x86: Booting SMP configuration: [ 3.374689] .... node #0, CPUs: #1 [ 0.036528] kvm-clock: cpu 1, msr c65e041, secondary cpu clock [ 3.377864] kvm-stealtime: cpu 1, msr ba11e400 [ 3.377864] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [ 3.377864] smp: Brought up 2 nodes, 2 CPUs [ 3.377864] smpboot: Max logical packages: 1 [ 3.383240] smpboot: Total of 2 processors activated (9200.00 BogoMIPS) [ 3.386925] devtmpfs: initialized [ 3.386925] x86/mm: Memory block size: 128MB [ 3.425700] kworker/u4:0 (24) used greatest stack depth: 27280 bytes left [ 3.427288] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns [ 3.427288] futex hash table entries: 512 (order: 4, 65536 bytes) [ 3.434032] xor: automatically using best checksumming function avx [ 3.439158] RTC time: 23:23:04, date: 03/18/21 [ 3.443911] NET: Registered protocol family 16 [ 3.447815] audit: initializing netlink subsys (disabled) [ 3.453276] audit: type=2000 audit(1616109784.087:1): state=initialized audit_enabled=0 res=1 [ 3.459672] cpuidle: using governor menu [ 3.466828] ACPI: bus type PCI registered [ 3.467913] PCI: Using configuration type 1 for base access [ 4.030928] WARNING: workqueue cpumask: online intersect > possible intersect [ 4.034600] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 4.036002] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 4.044870] cryptd: max_cpu_qlen set to 1000 [ 4.213217] raid6: sse2x1 gen() 2091 MB/s [ 4.383168] raid6: sse2x1 xor() 1125 MB/s [ 4.548430] raid6: sse2x2 gen() 4241 MB/s [ 4.718447] raid6: sse2x2 xor() 2282 MB/s [ 4.888444] raid6: sse2x4 gen() 6431 MB/s [ 5.058441] raid6: sse2x4 xor() 3717 MB/s [ 5.228434] raid6: avx2x1 gen() 4663 MB/s [ 5.403180] raid6: avx2x1 xor() 2098 MB/s [ 5.568436] raid6: avx2x2 gen() 8444 MB/s [ 5.738440] raid6: avx2x2 xor() 4524 MB/s [ 5.908430] raid6: avx2x4 gen() 12344 MB/s [ 6.078434] raid6: avx2x4 xor() 6942 MB/s [ 6.080123] raid6: using algorithm avx2x4 gen() 12344 MB/s [ 6.081918] raid6: .... xor() 6942 MB/s, rmw enabled [ 6.083143] raid6: using avx2x2 recovery algorithm [ 6.086361] ACPI: Added _OSI(Module Device) [ 6.088291] ACPI: Added _OSI(Processor Device) [ 6.089989] ACPI: Added _OSI(3.0 _SCP Extensions) [ 6.091489] ACPI: Added _OSI(Processor Aggregator Device) [ 6.093171] ACPI: Added _OSI(Linux-Dell-Video) [ 6.094624] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) [ 6.161340] ACPI: 2 ACPI AML tables successfully acquired and loaded [ 6.189497] ACPI: Interpreter enabled [ 6.191378] ACPI: (supports S0 S3 S4 S5) [ 6.193181] ACPI: Using IOAPIC for interrupt routing [ 6.194352] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 6.198670] ACPI: Enabled 16 GPEs in block 00 to 0F [ 6.296878] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [ 6.298148] acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] [ 6.299603] acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM [ 6.300867] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [ 6.313356] PCI host bridge to bus 0000:00 [ 6.314421] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 6.314421] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 6.314421] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 6.314421] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] [ 6.315661] pci_bus 0000:00: root bus resource [bus 00-ff] [ 6.376745] pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI [ 6.583368] ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) [ 6.587448] ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) [ 6.593734] ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) [ 6.598294] ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) [ 6.602069] ACPI: PCI Interrupt Link [LNKS] (IRQs *9) [ 6.616347] pci 0000:00:05.0: vgaarb: setting as boot VGA device [ 6.617240] pci 0000:00:05.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none [ 6.617240] pci 0000:00:05.0: vgaarb: bridge control possible [ 6.617240] vgaarb: loaded [ 6.625441] SCSI subsystem initialized [ 6.626811] ACPI: bus type USB registered [ 6.628193] usbcore: registered new interface driver usbfs [ 6.633157] usbcore: registered new interface driver hub [ 6.634205] usbcore: registered new device driver usb [ 6.634753] media: Linux media interface: v0.10 [ 6.635968] videodev: Linux video capture interface: v2.00 [ 6.638094] pps_core: LinuxPPS API ver. 1 registered [ 6.639790] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 6.643687] PTP clock support registered [ 6.643687] EDAC MC: Ver: 3.0.0 [ 6.653696] Advanced Linux Sound Architecture Driver Initialized. [ 6.653966] PCI: Using ACPI for IRQ routing [ 6.655190] Bluetooth: Core ver 2.22 [ 6.656386] NET: Registered protocol family 31 [ 6.657233] Bluetooth: HCI device and connection manager initialized [ 6.663146] Bluetooth: HCI socket layer initialized [ 6.663146] Bluetooth: L2CAP socket layer initialized [ 6.663146] Bluetooth: SCO socket layer initialized [ 6.666271] NET: Registered protocol family 8 [ 6.667024] NET: Registered protocol family 20 [ 6.668504] NetLabel: Initializing [ 6.668504] NetLabel: domain hash size = 128 [ 6.668504] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 6.668504] NetLabel: unlabeled traffic allowed by default [ 6.674827] nfc: nfc_init: NFC Core ver 0.1 [ 6.675075] NET: Registered protocol family 39 [ 6.676043] clocksource: Switched to clocksource kvm-clock [ 7.179941] VFS: Disk quotas dquot_6.6.0 [ 7.181512] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 7.183545] FS-Cache: Loaded [ 7.185196] CacheFiles: Loaded [ 7.187263] AppArmor: AppArmor Filesystem Enabled [ 7.188647] pnp: PnP ACPI init [ 7.203732] pnp: PnP ACPI: found 7 devices [ 7.253997] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 7.258041] NET: Registered protocol family 2 [ 7.263068] tcp_listen_portaddr_hash hash table entries: 4096 (order: 6, 294912 bytes) [ 7.266042] TCP established hash table entries: 65536 (order: 7, 524288 bytes) [ 7.270669] TCP bind hash table entries: 65536 (order: 10, 4194304 bytes) [ 7.277131] TCP: Hash tables configured (established 65536 bind 65536) [ 7.279517] UDP hash table entries: 4096 (order: 7, 655360 bytes) [ 7.282520] UDP-Lite hash table entries: 4096 (order: 7, 655360 bytes) [ 7.285947] NET: Registered protocol family 1 [ 7.289124] RPC: Registered named UNIX socket transport module. [ 7.290509] RPC: Registered udp transport module. [ 7.291342] RPC: Registered tcp transport module. [ 7.292071] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 7.294618] NET: Registered protocol family 44 [ 7.295908] pci 0000:00:00.0: Limiting direct PCI/PCI transfers [ 7.297002] pci 0000:00:05.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] [ 7.299240] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 7.300301] software IO TLB: mapped [mem 0xb6000000-0xba000000] (64MB) [ 7.304953] RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 10737418240 ms ovfl timer [ 7.306499] RAPL PMU: hw unit of domain pp0-core 2^-0 Joules [ 7.307382] RAPL PMU: hw unit of domain package 2^-0 Joules [ 7.308627] RAPL PMU: hw unit of domain dram 2^-16 Joules [ 7.311646] kvm: already loaded the other module [ 7.313364] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns [ 7.360055] Initialise system trusted keyrings [ 7.362063] workingset: timestamp_bits=40 max_order=21 bucket_order=0 [ 7.363746] zbud: loaded [ 7.368740] DLM installed [ 7.371412] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ 7.378021] FS-Cache: Netfs 'nfs' registered for caching [ 7.380290] NFS: Registering the id_resolver key type [ 7.381627] Key type id_resolver registered [ 7.382450] Key type id_legacy registered [ 7.383379] nfs4filelayout_init: NFSv4 File Layout Driver Registering... [ 7.384660] Installing knfsd (copyright (C) 1996 okir@monad.swb.de). [ 7.389133] FS-Cache: Netfs 'cifs' registered for caching [ 7.392602] Key type cifs.spnego registered [ 7.393945] ntfs: driver 2.1.32 [Flags: R/W]. [ 7.395233] efs: 1.0a - http://aeschi.ch.eu.org/efs/ [ 7.396361] jffs2: version 2.2. (NAND) (SUMMARY) © 2001-2006 Red Hat, Inc. [ 7.399065] romfs: ROMFS MTD (C) 2007 Red Hat, Inc. [ 7.400948] QNX4 filesystem 0.2.3 registered. [ 7.402263] qnx6: QNX6 filesystem 1.0.0 registered. [ 7.403871] fuse init (API version 7.27) [ 7.407145] orangefs_debugfs_init: called with debug mask: :none: :0: [ 7.409227] orangefs_init: module version upstream loaded [ 7.410677] JFS: nTxBlock = 8192, nTxLock = 65536 [ 7.420231] SGI XFS with ACLs, security attributes, realtime, no debug enabled [ 7.425944] 9p: Installing v9fs 9p2000 file system support [ 7.427339] FS-Cache: Netfs '9p' registered for caching [ 7.429098] NILFS version 2 loaded [ 7.429673] befs: version: 0.9.3 [ 7.431715] ocfs2: Registered cluster interface o2cb [ 7.432971] ocfs2: Registered cluster interface user [ 7.434328] OCFS2 User DLM kernel interface loaded [ 7.445173] gfs2: GFS2 installed [ 7.448632] FS-Cache: Netfs 'ceph' registered for caching [ 7.449873] ceph: loaded (mds proto 32) [ 7.484823] NET: Registered protocol family 38 [ 7.486939] async_tx: api initialized (async) [ 7.489422] Key type asymmetric registered [ 7.490582] Asymmetric key parser 'x509' registered [ 7.491652] Key type pkcs7_test registered [ 7.492838] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 241) [ 7.494770] io scheduler noop registered [ 7.495478] io scheduler deadline registered [ 7.496434] io scheduler cfq registered (default) [ 7.497270] io scheduler mq-deadline registered [ 7.498190] io scheduler kyber registered [ 7.499286] io scheduler bfq registered [ 7.508435] usbcore: registered new interface driver udlfb [ 7.509579] usbcore: registered new interface driver smscufx [ 7.512134] uvesafb: failed to execute /sbin/v86d [ 7.512939] uvesafb: make sure that the v86d helper is installed and executable [ 7.515413] uvesafb: Getting VBE info block failed (eax=0x4f00, err=-2) [ 7.516476] uvesafb: vbe_init() failed with -22 [ 7.517383] uvesafb: probe of uvesafb.0 failed with error -22 [ 7.519103] vga16fb: mapped to 0x00000000c1bfcdfb [ 7.585521] Console: switching to colour frame buffer device 80x30 [ 7.858019] fb0: VGA16 VGA frame buffer device [ 7.860440] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 [ 7.861949] ACPI: Power Button [PWRF] [ 7.863442] input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input1 [ 7.864810] ACPI: Sleep Button [SLPF] [ 7.885047] PCI Interrupt Link [LNKC] enabled at IRQ 11 [ 7.886087] virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver [ 7.905330] PCI Interrupt Link [LNKD] enabled at IRQ 10 [ 7.906782] virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver [ 7.926796] PCI Interrupt Link [LNKB] enabled at IRQ 10 [ 7.927953] virtio-pci 0000:00:06.0: virtio_pci: leaving for legacy driver [ 7.941573] virtio-pci 0000:00:07.0: virtio_pci: leaving for legacy driver [ 8.240095] HDLC line discipline maxframe=4096 [ 8.241072] N_HDLC line discipline registered. [ 8.241864] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 8.267590] 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [ 8.299662] 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A [ 8.326715] 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A [ 8.354080] 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A [ 8.359604] Cyclades driver 2.6 [ 8.361373] Initializing Nozomi driver 2.1d [ 8.362698] RocketPort device driver module, version 2.09, 12-June-2003 [ 8.365543] No rocketport ports found; unloading driver [ 8.371918] Non-volatile memory driver v1.3 [ 8.401357] random: fast init done [ 8.401842] Linux agpgart interface v0.103 [ 8.402940] random: crng init done [ 8.410974] [drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0 [ 8.412987] [drm] Supports vblank timestamp caching Rev 2 (21.10.2013). [ 8.414741] [drm] Driver supports precise vblank timestamp query. [ 8.419366] [drm] Initialized vkms 1.0.0 20180514 for virtual device on minor 1 [ 8.421995] usbcore: registered new interface driver udl [ 8.471290] brd: module loaded [ 8.535550] loop: module loaded [ 8.602926] zram: Added device: zram0 [ 8.610467] null: module loaded [ 8.611568] Guest personality initialized and is inactive [ 8.614958] VMCI host device registered (name=vmci, major=10, minor=55) [ 8.617230] Initialized host personality [ 8.618951] usbcore: registered new interface driver rtsx_usb [ 8.621442] usbcore: registered new interface driver viperboard [ 8.623111] usbcore: registered new interface driver dln2 [ 8.625516] usbcore: registered new interface driver pn533_usb [ 8.630162] nfcsim 0.2 initialized [ 8.631544] usbcore: registered new interface driver port100 [ 8.633237] usbcore: registered new interface driver nfcmrvl [ 8.636358] Loading iSCSI transport class v2.0-870. [ 8.668181] scsi host0: Virtio SCSI HBA [ 8.737115] st: Version 20160209, fixed bufsize 32768, s/g segs 256 [ 8.748119] scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 [ 8.762776] Rounding down aligned max_sectors from 4294967295 to 4294967288 [ 8.766024] db_root: cannot open: /etc/target [ 8.768282] slram: not enough parameters. [ 8.772787] ftl_cs: FTL header not found. [ 8.779587] Ethernet Channel Bonding Driver: v3.7.1 (April 27, 2011) [ 8.805653] eql: Equalizer2002: Simon Janes (simon@ncm.com) and David S. Miller (davem@redhat.com) [ 8.820277] MACsec IEEE 802.1AE [ 8.825888] libphy: Fixed MDIO Bus: probed [ 8.830390] tun: Universal TUN/TAP device driver, 1.6 [ 8.887849] vcan: Virtual CAN interface driver [ 8.889977] vxcan: Virtual CAN Tunnel driver [ 8.891482] slcan: serial line CAN interface driver [ 8.893914] slcan: 10 dynamic interface channels. [ 8.895869] CAN device driver interface [ 8.897904] usbcore: registered new interface driver usb_8dev [ 8.900762] usbcore: registered new interface driver ems_usb [ 8.903808] usbcore: registered new interface driver esd_usb2 [ 8.906479] usbcore: registered new interface driver gs_usb [ 8.909494] usbcore: registered new interface driver kvaser_usb [ 8.911923] usbcore: registered new interface driver mcba_usb [ 8.914111] usbcore: registered new interface driver peak_usb [ 8.916114] e100: Intel(R) PRO/100 Network Driver, 3.5.24-k2-NAPI [ 8.917719] e100: Copyright(c) 1999-2006 Intel Corporation [ 8.920330] e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI [ 8.922316] e1000: Copyright (c) 1999-2006 Intel Corporation. [ 8.925101] e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k [ 8.926775] e1000e: Copyright(c) 1999 - 2015 Intel Corporation. [ 8.930107] mkiss: AX.25 Multikiss, Hans Albas PE1AYX [ 8.931722] AX.25: 6pack driver, Revision: 0.3.0 [ 8.934317] AX.25: bpqether driver version 004 [ 8.935560] PPP generic driver version 2.4.2 [ 8.937766] PPP BSD Compression module registered [ 8.939130] PPP Deflate Compression module registered [ 8.940638] PPP MPPE Compression module registered [ 8.942020] NET: Registered protocol family 24 [ 8.944643] PPTP driver version 0.8.5 [ 8.946352] SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256) (6 bit encapsulation enabled). [ 8.949594] CSLIP: code copyright 1989 Regents of the University of California. [ 8.951779] SLIP linefill/keepalive option. [ 8.953075] hdlc: HDLC support module revision 1.22 [ 8.955387] x25_asy: X.25 async: version 0.00 ALPHA (dynamic channels, max=256) [ 8.958057] DLCI driver v0.35, 4 Jan 1997, mike.mclagan@linux.org. [ 8.960252] LAPB Ethernet driver version 0.02 [ 8.963016] usbcore: registered new interface driver ath9k_htc [ 8.965408] usbcore: registered new interface driver carl9170 [ 8.967895] usbcore: registered new interface driver ath6kl_usb [ 8.970041] usbcore: registered new interface driver ar5523 [ 8.973417] usbcore: registered new interface driver ath10k_usb [ 8.976167] usbcore: registered new interface driver rndis_wlan [ 8.978776] mac80211_hwsim: initializing netlink [ 9.009696] usbcore: registered new interface driver i2400m_usb [ 9.013832] fakelb driver is marked as deprecated, please use mac802154_hwsim! [ 9.028511] ieee802154fakelb ieee802154fakelb: added 2 fake ieee802154 hardware devices [ 9.032465] usbcore: registered new interface driver atusb [ 9.046916] mac802154_hwsim mac802154_hwsim: Added 2 mac802154 hwsim hardware radios [ 9.050482] VMware vmxnet3 virtual NIC driver - version 1.4.16.0-k-NAPI [ 9.053048] usbcore: registered new interface driver catc [ 9.055007] usbcore: registered new interface driver kaweth [ 9.056411] pegasus: v0.9.3 (2013/04/25), Pegasus/Pegasus II USB Ethernet driver [ 9.059441] usbcore: registered new interface driver pegasus [ 9.061797] usbcore: registered new interface driver rtl8150 [ 9.064751] usbcore: registered new interface driver r8152 [ 9.066444] hso: drivers/net/usb/hso.c: Option Wireless [ 9.069316] usbcore: registered new interface driver hso [ 9.071551] usbcore: registered new interface driver lan78xx [ 9.073559] usbcore: registered new interface driver asix [ 9.075553] usbcore: registered new interface driver ax88179_178a [ 9.077488] usbcore: registered new interface driver cdc_ether [ 9.080003] usbcore: registered new interface driver cdc_eem [ 9.082164] usbcore: registered new interface driver dm9601 [ 9.084509] usbcore: registered new interface driver sr9700 [ 9.086682] usbcore: registered new interface driver CoreChips [ 9.089100] usbcore: registered new interface driver smsc75xx [ 9.091687] usbcore: registered new interface driver smsc95xx [ 9.094273] usbcore: registered new interface driver gl620a [ 9.097800] usbcore: registered new interface driver net1080 [ 9.100049] usbcore: registered new interface driver plusb [ 9.101994] usbcore: registered new interface driver rndis_host [ 9.104452] usbcore: registered new interface driver cdc_subset [ 9.106733] usbcore: registered new interface driver zaurus [ 9.108751] usbcore: registered new interface driver MOSCHIP usb-ethernet driver [ 9.111202] usbcore: registered new interface driver int51x1 [ 9.113292] usbcore: registered new interface driver cdc_phonet [ 9.115106] usbcore: registered new interface driver kalmia [ 9.117077] usbcore: registered new interface driver ipheth [ 9.119236] usbcore: registered new interface driver sierra_net [ 9.121380] usbcore: registered new interface driver cx82310_eth [ 9.124313] usbcore: registered new interface driver cdc_ncm [ 9.126253] usbcore: registered new interface driver huawei_cdc_ncm [ 9.128848] usbcore: registered new interface driver lg-vl600 [ 9.131171] usbcore: registered new interface driver qmi_wwan [ 9.133020] usbcore: registered new interface driver cdc_mbim [ 9.134938] usbcore: registered new interface driver ch9200 [ 9.141357] VFIO - User Level meta-driver version: 0.3 [ 9.152732] aoe: AoE v85 initialised. [ 9.159569] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver [ 9.161829] ehci-pci: EHCI PCI platform driver [ 9.165016] ehci-platform: EHCI generic platform driver [ 9.167333] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver [ 9.168962] ohci-pci: OHCI PCI platform driver [ 9.171207] ohci-platform: OHCI generic platform driver [ 9.173046] uhci_hcd: USB Universal Host Controller Interface driver [ 9.179983] driver u132_hcd [ 9.182249] fotg210_hcd: FOTG210 Host Controller (EHCI) Driver [ 9.184261] Warning! fotg210_hcd should always be loaded before uhci_hcd and ohci_hcd, not after [ 9.190270] usbcore: registered new interface driver cdc_acm [ 9.191916] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters [ 9.195135] usbcore: registered new interface driver usblp [ 9.197129] usbcore: registered new interface driver cdc_wdm [ 9.198973] usbcore: registered new interface driver usbtmc [ 9.201407] usbcore: registered new interface driver uas [ 9.202976] usbcore: registered new interface driver usb-storage [ 9.206629] usbcore: registered new interface driver ums-alauda [ 9.208515] usbcore: registered new interface driver ums-cypress [ 9.211868] usbcore: registered new interface driver ums-datafab [ 9.214497] usbcore: registered new interface driver ums_eneub6250 [ 9.216657] usbcore: registered new interface driver ums-freecom [ 9.218725] usbcore: registered new interface driver ums-isd200 [ 9.220641] usbcore: registered new interface driver ums-jumpshot [ 9.222890] usbcore: registered new interface driver ums-karma [ 9.225411] usbcore: registered new interface driver ums-onetouch [ 9.227675] usbcore: registered new interface driver ums-realtek [ 9.229535] usbcore: registered new interface driver ums-sddr09 [ 9.231538] usbcore: registered new interface driver ums-sddr55 [ 9.234555] usbcore: registered new interface driver ums-usbat [ 9.236918] usbcore: registered new interface driver mdc800 [ 9.238239] mdc800: v0.7.5 (30/10/2000):USB Driver for Mustek MDC800 Digital Camera [ 9.240426] usbcore: registered new interface driver microtekX6 [ 9.243080] usbcore: registered new interface driver usbserial_generic [ 9.247396] usbserial: USB Serial support registered for generic [ 9.250481] usbcore: registered new interface driver aircable [ 9.255271] usbserial: USB Serial support registered for aircable [ 9.257347] usbcore: registered new interface driver ark3116 [ 9.259260] usbserial: USB Serial support registered for ark3116 [ 9.261557] usbcore: registered new interface driver belkin_sa [ 9.264277] usbserial: USB Serial support registered for Belkin / Peracom / GoHubs USB Serial Adapter [ 9.267296] usbcore: registered new interface driver ch341 [ 9.269294] usbserial: USB Serial support registered for ch341-uart [ 9.271279] usbcore: registered new interface driver cp210x [ 9.273561] usbserial: USB Serial support registered for cp210x [ 9.275506] usbcore: registered new interface driver cyberjack [ 9.277662] usbserial: USB Serial support registered for Reiner SCT Cyberjack USB card reader [ 9.280566] usbcore: registered new interface driver cypress_m8 [ 9.282451] usbserial: USB Serial support registered for DeLorme Earthmate USB [ 9.284839] usbserial: USB Serial support registered for HID->COM RS232 Adapter [ 9.288703] usbserial: USB Serial support registered for Nokia CA-42 V2 Adapter [ 9.291134] usbcore: registered new interface driver usb_debug [ 9.292958] usbserial: USB Serial support registered for debug [ 9.294889] usbserial: USB Serial support registered for xhci_dbc [ 9.297696] usbcore: registered new interface driver digi_acceleport [ 9.299999] usbserial: USB Serial support registered for Digi 2 port USB adapter [ 9.302328] usbserial: USB Serial support registered for Digi 4 port USB adapter [ 9.305275] usbcore: registered new interface driver io_edgeport [ 9.307678] usbserial: USB Serial support registered for Edgeport 2 port adapter [ 9.309839] usbserial: USB Serial support registered for Edgeport 4 port adapter [ 9.312522] usbserial: USB Serial support registered for Edgeport 8 port adapter [ 9.314826] usbserial: USB Serial support registered for EPiC device [ 9.316732] usbcore: registered new interface driver io_ti [ 9.318453] usbserial: USB Serial support registered for Edgeport TI 1 port adapter [ 9.320822] usbserial: USB Serial support registered for Edgeport TI 2 port adapter [ 9.323846] usbcore: registered new interface driver empeg [ 9.325630] usbserial: USB Serial support registered for empeg [ 9.327460] usbcore: registered new interface driver f81232 [ 9.329180] usbserial: USB Serial support registered for f81232 [ 9.331678] usbcore: registered new interface driver f81534 [ 9.333945] usbserial: USB Serial support registered for Fintek F81532/F81534 [ 9.337146] usbcore: registered new interface driver ftdi_sio [ 9.338835] usbserial: USB Serial support registered for FTDI USB Serial Device [ 9.341070] usbcore: registered new interface driver garmin_gps [ 9.343764] usbserial: USB Serial support registered for Garmin GPS usb/tty [ 9.346457] usbcore: registered new interface driver ipaq [ 9.348475] usbserial: USB Serial support registered for PocketPC PDA [ 9.350654] usbcore: registered new interface driver ipw [ 9.352467] usbserial: USB Serial support registered for IPWireless converter [ 9.354813] usbcore: registered new interface driver ir_usb [ 9.356971] usbserial: USB Serial support registered for IR Dongle [ 9.359032] usbcore: registered new interface driver iuu_phoenix [ 9.361129] usbserial: USB Serial support registered for iuu_phoenix [ 9.363715] usbcore: registered new interface driver keyspan [ 9.365393] usbserial: USB Serial support registered for Keyspan - (without firmware) [ 9.368032] usbserial: USB Serial support registered for Keyspan 1 port adapter [ 9.370907] usbserial: USB Serial support registered for Keyspan 2 port adapter [ 9.373685] usbserial: USB Serial support registered for Keyspan 4 port adapter [ 9.375955] usbcore: registered new interface driver keyspan_pda [ 9.377762] usbserial: USB Serial support registered for Keyspan PDA [ 9.379938] usbserial: USB Serial support registered for Keyspan PDA - (prerenumeration) [ 9.382634] usbserial: USB Serial support registered for Xircom / Entrega PGS - (prerenumeration) [ 9.389094] usbcore: registered new interface driver kl5kusb105 [ 9.391040] usbserial: USB Serial support registered for KL5KUSB105D / PalmConnect [ 9.393374] usbcore: registered new interface driver kobil_sct [ 9.395282] usbserial: USB Serial support registered for KOBIL USB smart card terminal [ 9.398577] usbcore: registered new interface driver mct_u232 [ 9.400638] usbserial: USB Serial support registered for MCT U232 [ 9.402701] usbcore: registered new interface driver metro_usb [ 9.405259] usbserial: USB Serial support registered for Metrologic USB to Serial [ 9.412651] usbcore: registered new interface driver mos7720 [ 9.414715] usbserial: USB Serial support registered for Moschip 2 port adapter [ 9.417013] usbcore: registered new interface driver mos7840 [ 9.419042] usbserial: USB Serial support registered for Moschip 7840/7820 USB Serial Driver [ 9.422967] usbcore: registered new interface driver mxuport [ 9.425363] usbserial: USB Serial support registered for MOXA UPort [ 9.427413] usbcore: registered new interface driver navman [ 9.429061] usbserial: USB Serial support registered for navman [ 9.431429] usbcore: registered new interface driver omninet [ 9.433480] usbserial: USB Serial support registered for ZyXEL - omni.net lcd plus usb [ 9.436248] usbcore: registered new interface driver opticon [ 9.438598] usbserial: USB Serial support registered for opticon [ 9.442280] usbcore: registered new interface driver option [ 9.444286] usbserial: USB Serial support registered for GSM modem (1-port) [ 9.446565] usbcore: registered new interface driver oti6858 [ 9.449211] usbserial: USB Serial support registered for oti6858 [ 9.451409] usbcore: registered new interface driver pl2303 [ 9.453122] usbserial: USB Serial support registered for pl2303 [ 9.454998] usbcore: registered new interface driver qcaux [ 9.457319] usbserial: USB Serial support registered for qcaux [ 9.459734] usbcore: registered new interface driver qcserial [ 9.461669] usbserial: USB Serial support registered for Qualcomm USB modem [ 9.464293] usbcore: registered new interface driver quatech2 [ 9.466307] usbserial: USB Serial support registered for Quatech 2nd gen USB to Serial Driver [ 9.469353] usbcore: registered new interface driver safe_serial [ 9.471450] usbserial: USB Serial support registered for safe_serial [ 9.473735] usbcore: registered new interface driver sierra [ 9.476613] usbserial: USB Serial support registered for Sierra USB modem [ 9.479285] usbcore: registered new interface driver usb_serial_simple [ 9.481174] usbserial: USB Serial support registered for carelink [ 9.483013] usbserial: USB Serial support registered for zio [ 9.485253] usbserial: USB Serial support registered for funsoft [ 9.487509] usbserial: USB Serial support registered for flashloader [ 9.490761] usbserial: USB Serial support registered for google [ 9.492784] usbserial: USB Serial support registered for libtransistor [ 9.494775] usbserial: USB Serial support registered for vivopay [ 9.497215] usbserial: USB Serial support registered for moto_modem [ 9.499500] usbserial: USB Serial support registered for motorola_tetra [ 9.501564] usbserial: USB Serial support registered for novatel_gps [ 9.503461] usbserial: USB Serial support registered for hp4x [ 9.505585] usbserial: USB Serial support registered for suunto [ 9.508763] usbserial: USB Serial support registered for siemens_mpi [ 9.510949] usbcore: registered new interface driver spcp8x5 [ 9.512859] usbserial: USB Serial support registered for SPCP8x5 [ 9.514785] usbcore: registered new interface driver ssu100 [ 9.516397] usbserial: USB Serial support registered for Quatech SSU-100 USB to Serial Driver [ 9.519487] usbcore: registered new interface driver symbolserial [ 9.521881] usbserial: USB Serial support registered for symbol [ 9.524278] usbcore: registered new interface driver ti_usb_3410_5052 [ 9.526280] usbserial: USB Serial support registered for TI USB 3410 1 port adapter [ 9.529006] usbserial: USB Serial support registered for TI USB 5052 2 port adapter [ 9.531324] usbcore: registered new interface driver upd78f0730 [ 9.534651] usbserial: USB Serial support registered for upd78f0730 [ 9.537410] usbcore: registered new interface driver visor [ 9.539271] usbserial: USB Serial support registered for Handspring Visor / Palm OS [ 9.542137] usbserial: USB Serial support registered for Sony Clie 5.0 [ 9.545592] usbserial: USB Serial support registered for Sony Clie 3.5 [ 9.547678] usbcore: registered new interface driver wishbone_serial [ 9.549883] usbserial: USB Serial support registered for wishbone_serial [ 9.552067] usbcore: registered new interface driver whiteheat [ 9.554428] usbserial: USB Serial support registered for Connect Tech - WhiteHEAT - (prerenumeration) [ 9.557319] usbserial: USB Serial support registered for Connect Tech - WhiteHEAT [ 9.559931] usbcore: registered new interface driver xsens_mt [ 9.561875] usbserial: USB Serial support registered for xsens_mt [ 9.564349] usbcore: registered new interface driver adutux [ 9.566533] usbcore: registered new interface driver appledisplay [ 9.570506] usbcore: registered new interface driver cypress_cy7c63 [ 9.572967] usbcore: registered new interface driver cytherm [ 9.574930] usbcore: registered new interface driver emi26 - firmware loader [ 9.577545] usbcore: registered new interface driver emi62 - firmware loader [ 9.579329] ftdi_elan: driver ftdi-elan [ 9.581085] usbcore: registered new interface driver ftdi-elan [ 9.582925] usbcore: registered new interface driver idmouse [ 9.585033] usbcore: registered new interface driver iowarrior [ 9.587038] usbcore: registered new interface driver isight_firmware [ 9.589325] usbcore: registered new interface driver usblcd [ 9.591141] usbcore: registered new interface driver ldusb [ 9.594378] usbcore: registered new interface driver legousbtower [ 9.596737] usbcore: registered new interface driver usbtest [ 9.600317] usbcore: registered new interface driver usb_ehset_test [ 9.602546] usbcore: registered new interface driver trancevibrator [ 9.604885] usbcore: registered new interface driver uss720 [ 9.606423] uss720: USB Parport Cable driver for Cables using the Lucent Technologies USS720 Chip [ 9.608878] uss720: NOTE: this is a special purpose driver to allow nonstandard [ 9.611156] uss720: protocols (eg. bitbang) over USS720 usb to parallel cables [ 9.612916] uss720: If you just want to connect to a printer, use usblp instead [ 9.615745] usbcore: registered new interface driver usbsevseg [ 9.619708] usbcore: registered new interface driver yurex [ 9.624203] usbcore: registered new interface driver chaoskey [ 9.626159] usbcore: registered new interface driver sisusb [ 9.628735] usbcore: registered new interface driver lvs [ 9.630564] usbcore: registered new interface driver cxacru [ 9.632440] usbcore: registered new interface driver speedtch [ 9.634571] usbcore: registered new interface driver ueagle-atm [ 9.636240] xusbatm: malformed module parameters [ 9.642979] dummy_hcd dummy_hcd.0: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.645122] dummy_hcd dummy_hcd.0: Dummy host controller [ 9.650003] dummy_hcd dummy_hcd.0: new USB bus registered, assigned bus number 1 [ 9.653641] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.655925] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.658902] usb usb1: Product: Dummy host controller [ 9.660496] usb usb1: Manufacturer: Linux 4.19.181-syzkaller dummy_hcd [ 9.663621] usb usb1: SerialNumber: dummy_hcd.0 [ 9.670045] hub 1-0:1.0: USB hub found [ 9.672734] hub 1-0:1.0: 1 port detected [ 9.680335] dummy_hcd dummy_hcd.1: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.683235] dummy_hcd dummy_hcd.1: Dummy host controller [ 9.690935] dummy_hcd dummy_hcd.1: new USB bus registered, assigned bus number 2 [ 9.694920] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.697749] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.700185] usb usb2: Product: Dummy host controller [ 9.701771] usb usb2: Manufacturer: Linux 4.19.181-syzkaller dummy_hcd [ 9.712833] usb usb2: SerialNumber: dummy_hcd.1 [ 9.717517] hub 2-0:1.0: USB hub found [ 9.718900] hub 2-0:1.0: 1 port detected [ 9.724176] dummy_hcd dummy_hcd.2: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.727036] dummy_hcd dummy_hcd.2: Dummy host controller [ 9.730242] dummy_hcd dummy_hcd.2: new USB bus registered, assigned bus number 3 [ 9.734295] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.736954] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.738892] usb usb3: Product: Dummy host controller [ 9.740194] usb usb3: Manufacturer: Linux 4.19.181-syzkaller dummy_hcd [ 9.741782] usb usb3: SerialNumber: dummy_hcd.2 [ 9.746414] hub 3-0:1.0: USB hub found [ 9.748057] hub 3-0:1.0: 1 port detected [ 9.754390] dummy_hcd dummy_hcd.3: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.756667] dummy_hcd dummy_hcd.3: Dummy host controller [ 9.760678] dummy_hcd dummy_hcd.3: new USB bus registered, assigned bus number 4 [ 9.764053] usb usb4: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.767242] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.769301] usb usb4: Product: Dummy host controller [ 9.770500] usb usb4: Manufacturer: Linux 4.19.181-syzkaller dummy_hcd [ 9.772295] usb usb4: SerialNumber: dummy_hcd.3 [ 9.779585] hub 4-0:1.0: USB hub found [ 9.780896] hub 4-0:1.0: 1 port detected [ 9.787223] dummy_hcd dummy_hcd.4: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.789555] dummy_hcd dummy_hcd.4: Dummy host controller [ 9.792950] dummy_hcd dummy_hcd.4: new USB bus registered, assigned bus number 5 [ 9.796423] usb usb5: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.798639] usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.800377] usb usb5: Product: Dummy host controller [ 9.801573] usb usb5: Manufacturer: Linux 4.19.181-syzkaller dummy_hcd [ 9.803581] usb usb5: SerialNumber: dummy_hcd.4 [ 9.808163] hub 5-0:1.0: USB hub found [ 9.809451] hub 5-0:1.0: 1 port detected [ 9.814679] dummy_hcd dummy_hcd.5: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.816973] dummy_hcd dummy_hcd.5: Dummy host controller [ 9.821699] dummy_hcd dummy_hcd.5: new USB bus registered, assigned bus number 6 [ 9.825558] usb usb6: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.828691] usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.830810] usb usb6: Product: Dummy host controller [ 9.832261] usb usb6: Manufacturer: Linux 4.19.181-syzkaller dummy_hcd [ 9.834650] usb usb6: SerialNumber: dummy_hcd.5 [ 9.839880] hub 6-0:1.0: USB hub found [ 9.841388] hub 6-0:1.0: 1 port detected [ 9.847633] dummy_hcd dummy_hcd.6: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.850018] dummy_hcd dummy_hcd.6: Dummy host controller [ 9.852935] dummy_hcd dummy_hcd.6: new USB bus registered, assigned bus number 7 [ 9.857308] usb usb7: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.860569] usb usb7: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.862428] usb usb7: Product: Dummy host controller