, 0x8, 0x6}, 0x10}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, &(0x7f0000000300)=""/50, 0xcb, 0x32}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x0, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r5, 0x3, 0x0, 0x3, 0xa}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@base={0xb, 0x0, 0xff, 0x3f, 0x28, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1a, 0x2, &(0x7f00000015c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0x6, 0xd0, &(0x7f00000016c0)=""/208, 0x41000, 0x15, '\x00', r4, 0x12, r5, 0x8, &(0x7f00000017c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0xb, 0x61, 0xffffff7f}, 0x10, r2, r6, 0x0, &(0x7f00000018c0)=[r0, r0, r7, r0, r8, r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x43405) r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000140)=0xf6d6) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000000)=0x1) perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x80, 0x80, 0x8, 0x0, 0x2, 0x0, 0x2e28fe38, 0x1c44c, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x968, 0x2, @perf_config_ext={0xe608, 0x401}, 0x8004, 0x1c000000, 0x9, 0x2, 0x8, 0x40000000, 0x9, 0x0, 0x5, 0x0, 0x9}, r10, 0x2, r9, 0x6) 18:09:01 executing program 1: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000a80), 0x0, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x58, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x3}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0x6, 0x0, 0x3, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x0, 0xd, 0x5, 0x5, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0x8, 0x6}, 0x10}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, &(0x7f0000000300)=""/50, 0xcb, 0x32}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x0, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r5, 0x3, 0x0, 0x3, 0xa}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@base={0xb, 0x0, 0xff, 0x3f, 0x28, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1a, 0x2, &(0x7f00000015c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0x6, 0xd0, &(0x7f00000016c0)=""/208, 0x41000, 0x15, '\x00', r4, 0x12, r5, 0x8, &(0x7f00000017c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0xb, 0x61, 0xffffff7f}, 0x10, r2, r6, 0x0, &(0x7f00000018c0)=[r0, r0, r7, r0, r8, r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x43405) r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000140)=0xf6d6) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000000)=0x1) perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x80, 0x80, 0x8, 0x0, 0x2, 0x0, 0x2e28fe38, 0x1c44c, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x968, 0x2, @perf_config_ext={0xe608, 0x401}, 0x8004, 0x1c000000, 0x9, 0x2, 0x8, 0x40000000, 0x9, 0x0, 0x5, 0x0, 0x9}, r10, 0x2, r9, 0x6) 18:09:01 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000a80), 0x0, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x58, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x3}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0x6, 0x0, 0x3, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x0, 0xd, 0x5, 0x5, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0x8, 0x6}, 0x10}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, &(0x7f0000000300)=""/50, 0xcb, 0x32}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x0, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r5, 0x3, 0x0, 0x3, 0xa}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@base={0xb, 0x0, 0xff, 0x3f, 0x28, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1a, 0x2, &(0x7f00000015c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0x6, 0xd0, &(0x7f00000016c0)=""/208, 0x41000, 0x15, '\x00', r4, 0x12, r5, 0x8, &(0x7f00000017c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0xb, 0x61, 0xffffff7f}, 0x10, r2, r6, 0x0, &(0x7f00000018c0)=[r0, r0, r7, r0, r8, r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x43405) r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000140)=0xf6d6) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000000)=0x1) perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x80, 0x80, 0x8, 0x0, 0x2, 0x0, 0x2e28fe38, 0x1c44c, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x968, 0x2, @perf_config_ext={0xe608, 0x401}, 0x8004, 0x1c000000, 0x9, 0x2, 0x8, 0x40000000, 0x9, 0x0, 0x5, 0x0, 0x9}, r10, 0x2, r9, 0x6) 18:09:01 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000a80), 0x0, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x58, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x3}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0x6, 0x0, 0x3, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x0, 0xd, 0x5, 0x5, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0x8, 0x6}, 0x10}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, &(0x7f0000000300)=""/50, 0xcb, 0x32}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x0, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r5, 0x3, 0x0, 0x3, 0xa}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@base={0xb, 0x0, 0xff, 0x3f, 0x28, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1a, 0x2, &(0x7f00000015c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0x6, 0xd0, &(0x7f00000016c0)=""/208, 0x41000, 0x15, '\x00', r4, 0x12, r5, 0x8, &(0x7f00000017c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0xb, 0x61, 0xffffff7f}, 0x10, r2, r6, 0x0, &(0x7f00000018c0)=[r0, r0, r7, r0, r8, r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x43405) r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000140)=0xf6d6) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000000)=0x1) perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x80, 0x80, 0x8, 0x0, 0x2, 0x0, 0x2e28fe38, 0x1c44c, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x968, 0x2, @perf_config_ext={0xe608, 0x401}, 0x8004, 0x1c000000, 0x9, 0x2, 0x8, 0x40000000, 0x9, 0x0, 0x5, 0x0, 0x9}, r10, 0x2, r9, 0x6) 18:09:01 executing program 0: mknodat(0xffffffffffffffff, &(0x7f0000002100)='./file0/../file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x2c4d, &(0x7f0000002640), &(0x7f0000ffd000), &(0x7f0000ffc000)) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x16, &(0x7f00000030c0)=[{0x0, 0x0, 0x0, 0x0, 0x0}], 0x1) 18:09:01 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000a80), 0x0, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x58, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x3}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0x6, 0x0, 0x3, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x0, 0xd, 0x5, 0x5, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0x8, 0x6}, 0x10}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, &(0x7f0000000300)=""/50, 0xcb, 0x32}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x0, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r5, 0x3, 0x0, 0x3, 0xa}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@base={0xb, 0x0, 0xff, 0x3f, 0x28, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1a, 0x2, &(0x7f00000015c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0x6, 0xd0, &(0x7f00000016c0)=""/208, 0x41000, 0x15, '\x00', r4, 0x12, r5, 0x8, &(0x7f00000017c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0xb, 0x61, 0xffffff7f}, 0x10, r2, r6, 0x0, &(0x7f00000018c0)=[r0, r0, r7, r0, r8, r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x43405) r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000140)=0xf6d6) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000000)=0x1) perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x80, 0x80, 0x8, 0x0, 0x2, 0x0, 0x2e28fe38, 0x1c44c, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x968, 0x2, @perf_config_ext={0xe608, 0x401}, 0x8004, 0x1c000000, 0x9, 0x2, 0x8, 0x40000000, 0x9, 0x0, 0x5, 0x0, 0x9}, r10, 0x2, r9, 0x6) 18:09:02 executing program 0: mknodat(0xffffffffffffffff, &(0x7f0000002100)='./file0/../file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x2c4d, &(0x7f0000002640), &(0x7f0000ffd000), &(0x7f0000ffc000)) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x16, &(0x7f00000030c0)=[{0x0, 0x0, 0x0, 0x0, 0x0}], 0x1) 18:09:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) [ 139.267917][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 139.267929][ T26] audit: type=1326 audit(1691777341.995:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 18:09:02 executing program 0: mknodat(0xffffffffffffffff, &(0x7f0000002100)='./file0/../file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x2c4d, &(0x7f0000002640), &(0x7f0000ffd000), &(0x7f0000ffc000)) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x16, &(0x7f00000030c0)=[{0x0, 0x0, 0x0, 0x0, 0x0}], 0x1) [ 139.370933][ T26] audit: type=1326 audit(1691777342.025:1337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 [ 139.394955][ T26] audit: type=1326 audit(1691777342.025:1338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 [ 139.418940][ T26] audit: type=1326 audit(1691777342.025:1339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 [ 139.443042][ T26] audit: type=1326 audit(1691777342.025:1340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 [ 139.467317][ T26] audit: type=1326 audit(1691777342.025:1341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 [ 139.491316][ T26] audit: type=1326 audit(1691777342.025:1342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 [ 139.515388][ T26] audit: type=1326 audit(1691777342.025:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 [ 139.539442][ T26] audit: type=1326 audit(1691777342.025:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 18:09:02 executing program 0: mknodat(0xffffffffffffffff, &(0x7f0000002100)='./file0/../file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x2c4d, &(0x7f0000002640), &(0x7f0000ffd000), &(0x7f0000ffc000)) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x16, &(0x7f00000030c0)=[{0x0, 0x0, 0x0, 0x0, 0x0}], 0x1) 18:09:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) [ 139.563481][ T26] audit: type=1326 audit(1691777342.025:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8155 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fe28d830ae9 code=0x7ffc0000 18:09:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000001980)=ANY=[@ANYBLOB="18010000000000e5ffffffff4a64ffec850000006d000000850000000500000095b70532194cd6a095b4dbcf20189c6eb8844e2c4897cf54dd0deb0976ff8cb2f1a0dfa3e5b33ebdcd99edfc5dee1b8158d59f9fedef03ef33f7c216f114d151cdd75fb439f9f9ac6bdef8b15950fa09b26ffbc8951c53971b3d6c73cf68b2f48095ebad68335c001ea7f105bc73857500563e053be06d6daf4777c83bbc31644eda38b82aaaea5fd28f37beaebec6a451a2e0402f83648ed1d73384b6903044808c45e2e94c02d0661161f28e08c2edfaa1235ef552bb795aee04c73478cf4e49427e5df9f2c38caacdaf79abca201635b0c9d8e9cb7d001b4dadccd9bb38e87073f2c4c3bcf64000ba5d07d409892b8f112f28fa5ea07839"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000a80), 0x0, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x58, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x3}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0x6, 0x0, 0x3, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x0, 0xd, 0x5, 0x5, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0x8, 0x6}, 0x10}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, &(0x7f0000000300)=""/50, 0xcb, 0x32}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x0, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r5, 0x3, 0x0, 0x3, 0xa}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@base={0xb, 0x0, 0xff, 0x3f, 0x28, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1a, 0x2, &(0x7f00000015c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0x6, 0xd0, &(0x7f00000016c0)=""/208, 0x41000, 0x15, '\x00', r4, 0x12, r5, 0x8, &(0x7f00000017c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0xb, 0x61, 0xffffff7f}, 0x10, r2, r6, 0x0, &(0x7f00000018c0)=[r0, r0, r7, r0, r8, r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x43405) r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000140)=0xf6d6) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000000)=0x1) perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x80, 0x80, 0x8, 0x0, 0x2, 0x0, 0x2e28fe38, 0x1c44c, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x968, 0x2, @perf_config_ext={0xe608, 0x401}, 0x8004, 0x1c000000, 0x9, 0x2, 0x8, 0x40000000, 0x9, 0x0, 0x5, 0x0, 0x9}, r10, 0x2, r9, 0x6) 18:09:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000a80), 0x0, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x58, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x3}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0x6, 0x0, 0x3, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x0, 0xd, 0x5, 0x5, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0x8, 0x6}, 0x10}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, &(0x7f0000000300)=""/50, 0xcb, 0x32}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x0, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r5, 0x3, 0x0, 0x3, 0xa}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@base={0xb, 0x0, 0xff, 0x3f, 0x28, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1a, 0x2, &(0x7f00000015c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0x6, 0xd0, &(0x7f00000016c0)=""/208, 0x41000, 0x15, '\x00', r4, 0x12, r5, 0x8, &(0x7f00000017c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0xb, 0x61, 0xffffff7f}, 0x10, r2, r6, 0x0, &(0x7f00000018c0)=[r0, r0, r7, r0, r8, r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x43405) r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000140)=0xf6d6) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000000)=0x1) perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x80, 0x80, 0x8, 0x0, 0x2, 0x0, 0x2e28fe38, 0x1c44c, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x968, 0x2, @perf_config_ext={0xe608, 0x401}, 0x8004, 0x1c000000, 0x9, 0x2, 0x8, 0x40000000, 0x9, 0x0, 0x5, 0x0, 0x9}, r10, 0x2, r9, 0x6) 18:09:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 2: mknodat(0xffffffffffffffff, &(0x7f0000002100)='./file0/../file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x2c4d, &(0x7f0000002640), &(0x7f0000ffd000), &(0x7f0000ffc000)) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x16, &(0x7f00000030c0)=[{0x0, 0x0, 0x0, 0x0, 0x0}], 0x1) 18:09:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/120}, 0x10ea47ed0497f2c0, 0x0, 0x0) 18:09:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x50, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYRES8, @ANYRES8=0x0, @ANYRESOCT, @ANYRESOCT], 0x1, 0x122a, &(0x7f00000024c0)="$eJzs3E9rHHUYB/An2ySNqfmj1moL4g8F0cvQ5OBFL0FSkC4obSO0gjA1G10y7obsElgRW09eRHwZIh69CeJNL7n4GrzlUvBgDuJId1LbrQG7tXZK+Hwu+7DPfofnNzsszDIze69/9dHmRi/byPvRmJiIxlZE2k+RohG3XI9XXvvp5+cuXr5y/no0Vy+kdG7l0tKrKaX5539495NvX/ixf+Kd7+a/Px67i+/t3Vj+dffU7um9Py992O6ldi91uv2Up6vdbj+/WrTSeru3maX0dtHKe63U7vRa2yP9jaK7tTVIeWd97ovfqwE6g7TZGqR+N/W3Byn/IG93UpZlaW42+C/Wvtkvy/KxiJiKyYi4Wc/GiXg85mI+FmIxnogn46k4GU/HqXgmno3TUZZlWffcAAAAAAAAAAAAAAAAAAAAcLTsD+/mL8upmB7e2f9v9/9/OVP3xAAAAAAAAAAAAAAAAAAAAHD0XLx85fxKs7l6IaWZiOLznbWdteq16q9sRDuKaMXZWIg/YviMgEpVn3uzuXo2DS3GZ8W1g/y1nbVjo/ml4eMEDs0vVfk0mj8es3fml2MhTh6eXz40PxMvv3hHPouF+OX96EYR63Ezezv/6VJKb7zVvCt/Zvg5AAAAOAqy9LdDz9+zbLQ/Ebf6VX6M/wfuOr+ejDOT9a6diN7g4828KFrb4xfHDjZxn/GHWEQ82A02DlZe97r+z2ImIh6BMR5M0RjnAPhtOuKfral73xtfj7xz46XqYKl9J4xZRMREXb9KPCy3v/S6JwEAAAAAAAAAAGAc93w94HTc9+WEda8RAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4C924FgAAAAAQJi/dRodGwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABfBQAA//9MGL16") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file2\x00', 0x4200, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc0185879, &(0x7f0000000800)={@desc={0x1, 0x0, @desc2}}) 18:09:02 executing program 2: mknodat(0xffffffffffffffff, &(0x7f0000002100)='./file0/../file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x2c4d, &(0x7f0000002640), &(0x7f0000ffd000), &(0x7f0000ffc000)) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x16, &(0x7f00000030c0)=[{0x0, 0x0, 0x0, 0x0, 0x0}], 0x1) 18:09:02 executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) bind$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 18:09:02 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000a80), 0x0, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x58, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x3}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0x6, 0x0, 0x3, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x0, 0xd, 0x5, 0x5, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0x8, 0x6}, 0x10}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, &(0x7f0000000300)=""/50, 0xcb, 0x32}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x0, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r5, 0x3, 0x0, 0x3, 0xa}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@base={0xb, 0x0, 0xff, 0x3f, 0x28, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1a, 0x2, &(0x7f00000015c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0x6, 0xd0, &(0x7f00000016c0)=""/208, 0x41000, 0x15, '\x00', r4, 0x12, r5, 0x8, &(0x7f00000017c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0xb, 0x61, 0xffffff7f}, 0x10, r2, r6, 0x0, &(0x7f00000018c0)=[r0, r0, r7, r0, r8, r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x43405) r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000140)=0xf6d6) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000000)=0x1) perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x80, 0x80, 0x8, 0x0, 0x2, 0x0, 0x2e28fe38, 0x1c44c, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x968, 0x2, @perf_config_ext={0xe608, 0x401}, 0x8004, 0x1c000000, 0x9, 0x2, 0x8, 0x40000000, 0x9, 0x0, 0x5, 0x0, 0x9}, r10, 0x2, r9, 0x6) 18:09:02 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000a80), 0x0, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0x58, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x3}, @map_fd={0x18, 0x4}, @jmp={0x5, 0x1, 0x6, 0x0, 0x3, 0x100, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x0, 0xd, 0x5, 0x5, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x4, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0x8, 0x6}, 0x10}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, &(0x7f0000000300)=""/50, 0xcb, 0x32}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x0, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r5, 0x3, 0x0, 0x3, 0xa}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@base={0xb, 0x0, 0xff, 0x3f, 0x28, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x26}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1a, 0x2, &(0x7f00000015c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x5}], &(0x7f0000001680)='GPL\x00', 0x6, 0xd0, &(0x7f00000016c0)=""/208, 0x41000, 0x15, '\x00', r4, 0x12, r5, 0x8, &(0x7f00000017c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0xb, 0x61, 0xffffff7f}, 0x10, r2, r6, 0x0, &(0x7f00000018c0)=[r0, r0, r7, r0, r8, r0, r0, r0]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x43405) r11 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000140)=0xf6d6) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000000)=0x1) perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x80, 0x80, 0x8, 0x0, 0x2, 0x0, 0x2e28fe38, 0x1c44c, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x968, 0x2, @perf_config_ext={0xe608, 0x401}, 0x8004, 0x1c000000, 0x9, 0x2, 0x8, 0x40000000, 0x9, 0x0, 0x5, 0x0, 0x9}, r10, 0x2, r9, 0x6) 18:09:02 executing program 1: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000000080)="010000000000060000071a80000001cc", 0x10) 18:09:03 executing program 1: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000000080)="010000000000060000071a80000001cc", 0x10) 18:09:03 executing program 2: mknodat(0xffffffffffffffff, &(0x7f0000002100)='./file0/../file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x2c4d, &(0x7f0000002640), &(0x7f0000ffd000), &(0x7f0000ffc000)) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x16, &(0x7f00000030c0)=[{0x0, 0x0, 0x0, 0x0, 0x0}], 0x1) 18:09:03 executing program 1: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000000080)="010000000000060000071a80000001cc", 0x10) 18:09:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:03 executing program 1: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000000080)="010000000000060000071a80000001cc", 0x10) 18:09:03 executing program 1: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) [ 140.378127][ T8206] loop3: detected capacity change from 0 to 8192 18:09:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x50, &(0x7f0000000980)=ANY=[@ANYBLOB="00f789da34e04a1ffbc2f05cef9da18f49c7880f67e77dc70b10bbb45efdb7896fdbb0b195ab5dd1bd0000000000000080f06ac2c5352509e31d672eb3ec0debb1ce6e9801634c353d3d4d316daf522556a17cab12da7f010400009c101c78130d6ef7480ceb2e60a1e30a59b7845235b33bc18c0106cf00d285197b02f8a78993b5ef947fcb57217be5a338392f831637ee8c35bb2183794afff0a99dd63b1226b18c4b455ab2000000000080000000000000001baff7b835bbd58caf80cdceaa5b37a4053a31b86f10607634721911a6af21693e337cd1a67642eb4da31fbad0723315972541081510bc01bb0d78b4d69da4bf0100c6b9cfc8c2dfd67f0bfff78e15cc4b12e78004dcd241eb688b17ec627c2bd69bef57a1ee91a3b44d5a938310004b3d4de9000000000000000000000000000000000f4e83e76fe45e5e8e32c10b9bbf37646b01001328b8877febaddf2a95342bfd2ad25b771f8ddee2969570abce7e2e8553d3aaa31d6c36c2015454cc85afe55fc3b333a2af96782b29fd6c886a37a042952d5d823be10000000000ed17fd9d6e5d00b6ff421630a659d0ad12de00010000dcbbd4e730a29ff91d53c901d74340b1da5debe58daeaa46aaabe4073138c9caa09fc2bb8c8df7a9d74a7e3e2d6a6dd6c3fbe9b4ea969f0000000000001fdf2458653a05bf862120314088a3bd43d966817697635b0812666b21bf587344994323ab343ce54e96fac0d40bccf3044ea417e1203452b3a527fce82c5fcbba8c015a4c4a76969c66279a043c103acd9693795ee7704fcaeb2a302ba18e84487952", @ANYRES64, @ANYRES8, @ANYRES8=0x0, @ANYRESOCT, @ANYRESOCT], 0x1, 0x122a, &(0x7f00000024c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file2\x00', 0x4200, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc0185879, &(0x7f0000000800)={@desc={0x1, 0x0, @desc2}}) [ 140.594456][ T8227] loop3: detected capacity change from 0 to 8192 18:09:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x50, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYRES8, @ANYRES8=0x0, @ANYRESOCT, @ANYRESOCT], 0x1, 0x122a, &(0x7f00000024c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file2\x00', 0x4200, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc0185879, &(0x7f0000000800)={@desc={0x1, 0x0, @desc2}}) 18:09:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x50, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYRES8, @ANYRES8=0x0, @ANYRESOCT, @ANYRESOCT], 0x1, 0x122a, &(0x7f00000024c0)="$eJzs3E9rHHUYB/An2ySNqfmj1moL4g8F0cvQ5OBFL0FSkC4obSO0gjA1G10y7obsElgRW09eRHwZIh69CeJNL7n4GrzlUvBgDuJId1LbrQG7tXZK+Hwu+7DPfofnNzsszDIze69/9dHmRi/byPvRmJiIxlZE2k+RohG3XI9XXvvp5+cuXr5y/no0Vy+kdG7l0tKrKaX5539495NvX/ixf+Kd7+a/Px67i+/t3Vj+dffU7um9Py992O6ldi91uv2Up6vdbj+/WrTSeru3maX0dtHKe63U7vRa2yP9jaK7tTVIeWd97ovfqwE6g7TZGqR+N/W3Byn/IG93UpZlaW42+C/Wvtkvy/KxiJiKyYi4Wc/GiXg85mI+FmIxnogn46k4GU/HqXgmno3TUZZlWffcAAAAAAAAAAAAAAAAAAAAcLTsD+/mL8upmB7e2f9v9/9/OVP3xAAAAAAAAAAAAAAAAAAAAHD0XLx85fxKs7l6IaWZiOLznbWdteq16q9sRDuKaMXZWIg/YviMgEpVn3uzuXo2DS3GZ8W1g/y1nbVjo/ml4eMEDs0vVfk0mj8es3fml2MhTh6eXz40PxMvv3hHPouF+OX96EYR63Ezezv/6VJKb7zVvCt/Zvg5AAAAOAqy9LdDz9+zbLQ/Ebf6VX6M/wfuOr+ejDOT9a6diN7g4828KFrb4xfHDjZxn/GHWEQ82A02DlZe97r+z2ImIh6BMR5M0RjnAPhtOuKfral73xtfj7xz46XqYKl9J4xZRMREXb9KPCy3v/S6JwEAAAAAAAAAAGAc93w94HTc9+WEda8RAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4C924FgAAAAAQJi/dRodGwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABfBQAA//9MGL16") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file2\x00', 0x4200, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc0185879, &(0x7f0000000800)={@desc={0x1, 0x0, @desc2}}) [ 140.790126][ T8233] loop4: detected capacity change from 0 to 8192 [ 140.817379][ T8234] loop3: detected capacity change from 0 to 8192 18:09:03 executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) bind$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 18:09:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETAF(r0, 0x540f, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, "6323ce9172c63d99"}) 18:09:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x50, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYRES8, @ANYRES8=0x0, @ANYRESOCT, @ANYRESOCT], 0x1, 0x122a, &(0x7f00000024c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file2\x00', 0x4200, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc0185879, &(0x7f0000000800)={@desc={0x1, 0x0, @desc2}}) 18:09:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x50, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYRES8, @ANYRES8=0x0, @ANYRESOCT, @ANYRESOCT], 0x1, 0x122a, &(0x7f00000024c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file2\x00', 0x4200, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc0185879, &(0x7f0000000800)={@desc={0x1, 0x0, @desc2}}) 18:09:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETAF(r0, 0x540f, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, "6323ce9172c63d99"}) 18:09:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETAF(r0, 0x540f, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, "6323ce9172c63d99"}) 18:09:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETAF(r0, 0x540f, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, "6323ce9172c63d99"}) [ 141.140501][ T8241] loop4: detected capacity change from 0 to 8192 [ 141.231605][ T8244] loop3: detected capacity change from 0 to 8192 18:09:04 executing program 1: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18:09:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x50, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYRES8, @ANYRES8=0x0, @ANYRESOCT, @ANYRESOCT], 0x1, 0x122a, &(0x7f00000024c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file2\x00', 0x4200, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc0185879, &(0x7f0000000800)={@desc={0x1, 0x0, @desc2}}) 18:09:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) [ 141.409391][ T8257] loop4: detected capacity change from 0 to 8192 18:09:04 executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) bind$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 18:09:04 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18:09:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:05 executing program 1: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18:09:05 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:05 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:05 executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) bind$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 18:09:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:05 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18:09:05 executing program 1: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18:09:06 executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18:09:06 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:06 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000400)="050346000800baffffff02000800", 0xe, 0x0, 0x0, 0x0) 18:09:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000400)="050346000800baffffff02000800", 0xe, 0x0, 0x0, 0x0) 18:09:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000400)="050346000800baffffff02000800", 0xe, 0x0, 0x0, 0x0) 18:09:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000400)="050346000800baffffff02000800", 0xe, 0x0, 0x0, 0x0) 18:09:06 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18:09:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000007880)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="fd", 0x1}, {0x0}], 0x2}}], 0x1, 0x0) 18:09:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000007880)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="fd", 0x1}, {0x0}], 0x2}}], 0x1, 0x0) 18:09:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000007880)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="fd", 0x1}, {0x0}], 0x2}}], 0x1, 0x0) 18:09:06 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:07 executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18:09:07 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000007880)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="fd", 0x1}, {0x0}], 0x2}}], 0x1, 0x0) 18:09:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000001000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @nat={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NAT_FAMILY={0x8}, @NFTA_NAT_REG_ADDR_MIN={0x8}, @NFTA_NAT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 18:09:07 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000001000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @nat={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NAT_FAMILY={0x8}, @NFTA_NAT_REG_ADDR_MIN={0x8}, @NFTA_NAT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 18:09:07 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x41009432, 0x0) 18:09:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000001000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @nat={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NAT_FAMILY={0x8}, @NFTA_NAT_REG_ADDR_MIN={0x8}, @NFTA_NAT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 18:09:07 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:07 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x41009432, 0x0) 18:09:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000001000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @nat={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NAT_FAMILY={0x8}, @NFTA_NAT_REG_ADDR_MIN={0x8}, @NFTA_NAT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 18:09:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) mount$nfs4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x800030, 0x0) 18:09:07 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x41009432, 0x0) [ 144.845287][ T26] kauditd_printk_skb: 171 callbacks suppressed [ 144.845312][ T26] audit: type=1400 audit(1691777347.565:1517): avc: denied { mount } for pid=8378 comm="syz-executor.4" name="/" dev="mqueue" ino=2930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 144.896656][ T26] audit: type=1400 audit(1691777347.595:1518): avc: denied { remount } for pid=8378 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 144.916830][ T26] audit: type=1400 audit(1691777347.615:1519): avc: denied { unmount } for pid=3090 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 18:09:08 executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x35, 0x0, 0x1f00000000000000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 18:09:08 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) mount$nfs4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x800030, 0x0) 18:09:08 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x41009432, 0x0) 18:09:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000001f00000084bc00444595"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7fffffff, 0xffffffffffffffda) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) unshare(0x46060480) mlockall(0x2) r2 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r2, &(0x7f0000244000/0xc000)=nil, 0x4000) mlockall(0x4) shmat(0x0, &(0x7f000029f000/0x4000)=nil, 0x6000) r3 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmctl$IPC_RMID(0x0, 0x0) r4 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000109000/0x4000)=nil) shmat(r4, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmctl$SHM_STAT_ANY(r4, 0xf, &(0x7f0000000080)=""/3) shmat(r2, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x6) mmap$binder(&(0x7f0000395000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xec07) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x6000) mlockall(0x1) shmdt(r3) shmat(0x0, &(0x7f00003b7000/0x1000)=nil, 0x6000) mlockall(0x7) shmget$private(0x0, 0x2000, 0x4, &(0x7f00003dc000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mlockall(0x5) shmat(r4, &(0x7f0000109000/0x4000)=nil, 0x6000) mlockall(0x0) 18:09:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) mount$nfs4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x800030, 0x0) 18:09:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) mount$nfs4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x800030, 0x0) 18:09:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) mount$nfs4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x800030, 0x0) 18:09:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x3c, r1, 0x1, 0x0, 0x0, {0x27}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 18:09:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) mount$nfs4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x800030, 0x0) 18:09:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x3c, r1, 0x1, 0x0, 0x0, {0x27}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 18:09:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) mount$nfs4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x800030, 0x0) 18:09:08 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x3d, 0x0, 0x1}, {0x7}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) 18:09:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x3c, r1, 0x1, 0x0, 0x0, {0x27}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 18:09:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20008001, 0x0, 0x0) 18:09:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0xf0ffff}]}], {0x14, 0x10}}, 0x70}}, 0x0) 18:09:08 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20008001, 0x0, 0x0) 18:09:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x3c, r1, 0x1, 0x0, 0x0, {0x27}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 18:09:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0xf0ffff}]}], {0x14, 0x10}}, 0x70}}, 0x0) 18:09:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x3d, 0x0, 0x1}, {0x7}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) 18:09:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0xf0ffff}]}], {0x14, 0x10}}, 0x70}}, 0x0) 18:09:09 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:09 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20008001, 0x0, 0x0) 18:09:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x3d, 0x0, 0x1}, {0x7}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) 18:09:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0xf0ffff}]}], {0x14, 0x10}}, 0x70}}, 0x0) 18:09:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20008001, 0x0, 0x0) 18:09:09 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) 18:09:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x3d, 0x0, 0x1}, {0x7}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) 18:09:09 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) 18:09:09 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) 18:09:10 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) 18:09:10 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) 18:09:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) 18:09:10 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:10 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 18:09:10 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:10 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 18:09:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000380)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @empty}}]}, 0x110) 18:09:10 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x81ff, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 18:09:10 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:11 executing program 5: unshare(0x4000400) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x70, &(0x7f0000000080)={0x0, 0xffffffffffffff67}}, 0x10) 18:09:11 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 18:09:11 executing program 4: mkdir(&(0x7f00000006c0)='./file0\x00', 0x17) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='udf\x00', 0x0, &(0x7f00000018c0)='cgroup2\x00') sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000300)=0x3) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x2000, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001d80)=[{{&(0x7f0000000200)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000001a00)=""/250, 0xfa}], 0x1, &(0x7f0000000640)=""/65, 0x41}, 0x5}, {{0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001940)=""/123, 0x7b}], 0x4, &(0x7f00000007c0)=""/212, 0xd4}}], 0x2, 0x2102, &(0x7f0000001f00)={0x0, 0x989680}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) sync() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 18:09:11 executing program 1: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040)={[0x375994bc]}, 0x0, 0x0, 0x8) timer_create(0x0, &(0x7f0000000080)={0x0, 0x1a, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) 18:09:11 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 18:09:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x407, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4e85d}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_MTU={0x8, 0xa, 0x100}]}, 0x48}}, 0x0) 18:09:11 executing program 5: unshare(0x4000400) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x70, &(0x7f0000000080)={0x0, 0xffffffffffffff67}}, 0x10) 18:09:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'macvlan0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x3}}) 18:09:11 executing program 5: unshare(0x4000400) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x70, &(0x7f0000000080)={0x0, 0xffffffffffffff67}}, 0x10) 18:09:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'macvlan0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x3}}) 18:09:11 executing program 1: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040)={[0x375994bc]}, 0x0, 0x0, 0x8) timer_create(0x0, &(0x7f0000000080)={0x0, 0x1a, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) 18:09:11 executing program 0: syz_emit_ethernet(0xa7, &(0x7f0000000680)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "75e700", 0x71, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0xa, "a78ce5400659808000000000004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af0302"}, {0x0, 0x1, "ffffffffff600000000004"}, {}]}}}}}}, 0x0) [ 148.848907][ T8509] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 50594 - 0 [ 148.857904][ T8509] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 50594 - 0 [ 148.866773][ T8509] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 50594 - 0 [ 148.875582][ T8509] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 50594 - 0 18:09:11 executing program 0: syz_emit_ethernet(0xa7, &(0x7f0000000680)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "75e700", 0x71, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0xa, "a78ce5400659808000000000004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af0302"}, {0x0, 0x1, "ffffffffff600000000004"}, {}]}}}}}}, 0x0) 18:09:11 executing program 5: unshare(0x4000400) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x70, &(0x7f0000000080)={0x0, 0xffffffffffffff67}}, 0x10) [ 148.903163][ T8509] netdevsim netdevsim2 netdevsim0: set [1, 2] type 2 family 0 port 42194 - 0 [ 148.912129][ T8509] netdevsim netdevsim2 netdevsim1: set [1, 2] type 2 family 0 port 42194 - 0 [ 148.921100][ T8509] netdevsim netdevsim2 netdevsim2: set [1, 2] type 2 family 0 port 42194 - 0 [ 148.929957][ T8509] netdevsim netdevsim2 netdevsim3: set [1, 2] type 2 family 0 port 42194 - 0 [ 148.953145][ T8509] netdevsim netdevsim2 netdevsim0: unset [1, 2] type 2 family 0 port 42194 - 0 [ 148.962219][ T8509] netdevsim netdevsim2 netdevsim1: unset [1, 2] type 2 family 0 port 42194 - 0 [ 148.971401][ T8509] netdevsim netdevsim2 netdevsim2: unset [1, 2] type 2 family 0 port 42194 - 0 [ 148.980498][ T8509] netdevsim netdevsim2 netdevsim3: unset [1, 2] type 2 family 0 port 42194 - 0 [ 148.989825][ T8509] netdevsim netdevsim2 netdevsim0: unset [1, 1] type 2 family 0 port 50594 - 0 [ 148.998946][ T8509] netdevsim netdevsim2 netdevsim1: unset [1, 1] type 2 family 0 port 50594 - 0 [ 149.008238][ T8509] netdevsim netdevsim2 netdevsim2: unset [1, 1] type 2 family 0 port 50594 - 0 [ 149.017256][ T8509] netdevsim netdevsim2 netdevsim3: unset [1, 1] type 2 family 0 port 50594 - 0 18:09:12 executing program 1: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040)={[0x375994bc]}, 0x0, 0x0, 0x8) timer_create(0x0, &(0x7f0000000080)={0x0, 0x1a, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) 18:09:12 executing program 0: syz_emit_ethernet(0xa7, &(0x7f0000000680)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "75e700", 0x71, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0xa, "a78ce5400659808000000000004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af0302"}, {0x0, 0x1, "ffffffffff600000000004"}, {}]}}}}}}, 0x0) 18:09:12 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000040)=0x6, 0x4) 18:09:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'macvlan0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x3}}) 18:09:12 executing program 4: mkdir(&(0x7f00000006c0)='./file0\x00', 0x17) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='udf\x00', 0x0, &(0x7f00000018c0)='cgroup2\x00') sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000300)=0x3) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x2000, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001d80)=[{{&(0x7f0000000200)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000001a00)=""/250, 0xfa}], 0x1, &(0x7f0000000640)=""/65, 0x41}, 0x5}, {{0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001940)=""/123, 0x7b}], 0x4, &(0x7f00000007c0)=""/212, 0xd4}}], 0x2, 0x2102, &(0x7f0000001f00)={0x0, 0x989680}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) sync() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 18:09:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x407, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4e85d}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_MTU={0x8, 0xa, 0x100}]}, 0x48}}, 0x0) 18:09:12 executing program 0: syz_emit_ethernet(0xa7, &(0x7f0000000680)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "75e700", 0x71, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0xa, "a78ce5400659808000000000004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af0302"}, {0x0, 0x1, "ffffffffff600000000004"}, {}]}}}}}}, 0x0) [ 149.647749][ T8533] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 40716 - 0 [ 149.656717][ T8533] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 40716 - 0 [ 149.665563][ T8533] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 40716 - 0 [ 149.674418][ T8533] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 40716 - 0 18:09:12 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000040)=0x6, 0x4) 18:09:12 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:12 executing program 1: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() rt_sigtimedwait(&(0x7f0000000040)={[0x375994bc]}, 0x0, 0x0, 0x8) timer_create(0x0, &(0x7f0000000080)={0x0, 0x1a, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) 18:09:12 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000040)=0x6, 0x4) [ 149.683430][ T26] audit: type=1400 audit(1691777352.375:1520): avc: denied { setopt } for pid=8531 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 149.704220][ T8533] netdevsim netdevsim2 netdevsim0: set [1, 2] type 2 family 0 port 34091 - 0 [ 149.713207][ T8533] netdevsim netdevsim2 netdevsim1: set [1, 2] type 2 family 0 port 34091 - 0 [ 149.722047][ T8533] netdevsim netdevsim2 netdevsim2: set [1, 2] type 2 family 0 port 34091 - 0 [ 149.730967][ T8533] netdevsim netdevsim2 netdevsim3: set [1, 2] type 2 family 0 port 34091 - 0 18:09:12 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000040)=0x6, 0x4) [ 149.750271][ T8533] netdevsim netdevsim2 netdevsim0: unset [1, 2] type 2 family 0 port 34091 - 0 [ 149.759517][ T8533] netdevsim netdevsim2 netdevsim1: unset [1, 2] type 2 family 0 port 34091 - 0 [ 149.768520][ T8533] netdevsim netdevsim2 netdevsim2: unset [1, 2] type 2 family 0 port 34091 - 0 [ 149.777536][ T8533] netdevsim netdevsim2 netdevsim3: unset [1, 2] type 2 family 0 port 34091 - 0 [ 149.787477][ T8533] netdevsim netdevsim2 netdevsim0: unset [1, 1] type 2 family 0 port 40716 - 0 18:09:12 executing program 5: socket$xdp(0x2c, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x220000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:09:12 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8920, &(0x7f0000000000)={'vxcan1\x00'}) 18:09:12 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) [ 149.796509][ T8533] netdevsim netdevsim2 netdevsim1: unset [1, 1] type 2 family 0 port 40716 - 0 [ 149.805587][ T8533] netdevsim netdevsim2 netdevsim2: unset [1, 1] type 2 family 0 port 40716 - 0 [ 149.814687][ T8533] netdevsim netdevsim2 netdevsim3: unset [1, 1] type 2 family 0 port 40716 - 0 [ 149.864927][ T26] audit: type=1400 audit(1691777352.585:1521): avc: denied { create } for pid=8557 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 149.890868][ T26] audit: type=1400 audit(1691777352.615:1522): avc: denied { create } for pid=8557 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 149.911981][ T26] audit: type=1400 audit(1691777352.615:1523): avc: denied { write } for pid=8557 comm="syz-executor.5" path="socket:[33421]" dev="sockfs" ino=33421 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 149.936934][ T26] audit: type=1400 audit(1691777352.615:1524): avc: denied { nlmsg_read } for pid=8557 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 149.958387][ T26] audit: type=1400 audit(1691777352.615:1525): avc: denied { setopt } for pid=8557 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 149.979799][ T26] audit: type=1400 audit(1691777352.625:1526): avc: denied { bind } for pid=8557 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 149.999509][ T26] audit: type=1400 audit(1691777352.625:1527): avc: denied { read } for pid=8557 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 18:09:13 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8920, &(0x7f0000000000)={'vxcan1\x00'}) 18:09:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'macvlan0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x3}}) 18:09:13 executing program 4: mkdir(&(0x7f00000006c0)='./file0\x00', 0x17) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='udf\x00', 0x0, &(0x7f00000018c0)='cgroup2\x00') sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000300)=0x3) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x2000, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001d80)=[{{&(0x7f0000000200)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000001a00)=""/250, 0xfa}], 0x1, &(0x7f0000000640)=""/65, 0x41}, 0x5}, {{0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001940)=""/123, 0x7b}], 0x4, &(0x7f00000007c0)=""/212, 0xd4}}], 0x2, 0x2102, &(0x7f0000001f00)={0x0, 0x989680}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) sync() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 18:09:13 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x407, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4e85d}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_MTU={0x8, 0xa, 0x100}]}, 0x48}}, 0x0) 18:09:13 executing program 5: socket$xdp(0x2c, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x220000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:09:13 executing program 3: socket$xdp(0x2c, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x220000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 150.502688][ T8570] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 49380 - 0 [ 150.511618][ T8570] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 49380 - 0 [ 150.520486][ T8570] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 49380 - 0 [ 150.529344][ T8570] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 49380 - 0 [ 150.543492][ T8570] netdevsim netdevsim2 netdevsim0: set [1, 2] type 2 family 0 port 51987 - 0 18:09:13 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8920, &(0x7f0000000000)={'vxcan1\x00'}) [ 150.552540][ T8570] netdevsim netdevsim2 netdevsim1: set [1, 2] type 2 family 0 port 51987 - 0 [ 150.561594][ T8570] netdevsim netdevsim2 netdevsim2: set [1, 2] type 2 family 0 port 51987 - 0 [ 150.570588][ T8570] netdevsim netdevsim2 netdevsim3: set [1, 2] type 2 family 0 port 51987 - 0 [ 150.584365][ T8570] netdevsim netdevsim2 netdevsim0: unset [1, 2] type 2 family 0 port 51987 - 0 [ 150.593591][ T8570] netdevsim netdevsim2 netdevsim1: unset [1, 2] type 2 family 0 port 51987 - 0 18:09:13 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8920, &(0x7f0000000000)={'vxcan1\x00'}) 18:09:13 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) [ 150.602783][ T8570] netdevsim netdevsim2 netdevsim2: unset [1, 2] type 2 family 0 port 51987 - 0 [ 150.612019][ T8570] netdevsim netdevsim2 netdevsim3: unset [1, 2] type 2 family 0 port 51987 - 0 [ 150.630597][ T8570] netdevsim netdevsim2 netdevsim0: unset [1, 1] type 2 family 0 port 49380 - 0 [ 150.639788][ T8570] netdevsim netdevsim2 netdevsim1: unset [1, 1] type 2 family 0 port 49380 - 0 18:09:13 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:13 executing program 5: socket$xdp(0x2c, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x220000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:09:13 executing program 3: socket$xdp(0x2c, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x220000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 150.648915][ T8570] netdevsim netdevsim2 netdevsim2: unset [1, 1] type 2 family 0 port 49380 - 0 [ 150.658035][ T8570] netdevsim netdevsim2 netdevsim3: unset [1, 1] type 2 family 0 port 49380 - 0 18:09:13 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 4: mkdir(&(0x7f00000006c0)='./file0\x00', 0x17) writev(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) mount(&(0x7f0000000440)=@sg0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='udf\x00', 0x0, &(0x7f00000018c0)='cgroup2\x00') sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000300)=0x3) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x2000, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001d80)=[{{&(0x7f0000000200)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000580)=[{&(0x7f0000001a00)=""/250, 0xfa}], 0x1, &(0x7f0000000640)=""/65, 0x41}, 0x5}, {{0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001940)=""/123, 0x7b}], 0x4, &(0x7f00000007c0)=""/212, 0xd4}}], 0x2, 0x2102, &(0x7f0000001f00)={0x0, 0x989680}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) sync() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 18:09:14 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 5: socket$xdp(0x2c, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x220000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:09:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x407, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4e85d}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_MTU={0x8, 0xa, 0x100}]}, 0x48}}, 0x0) 18:09:14 executing program 3: socket$xdp(0x2c, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x220000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:09:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) [ 151.373115][ T8605] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 50197 - 0 [ 151.382022][ T8605] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 50197 - 0 [ 151.390941][ T8605] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 50197 - 0 [ 151.399779][ T8605] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 50197 - 0 [ 151.408803][ T8605] netdevsim netdevsim2 netdevsim0: set [1, 2] type 2 family 0 port 54568 - 0 18:09:14 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) [ 151.417661][ T8605] netdevsim netdevsim2 netdevsim1: set [1, 2] type 2 family 0 port 54568 - 0 [ 151.426581][ T8605] netdevsim netdevsim2 netdevsim2: set [1, 2] type 2 family 0 port 54568 - 0 [ 151.435391][ T8605] netdevsim netdevsim2 netdevsim3: set [1, 2] type 2 family 0 port 54568 - 0 [ 151.458636][ T8605] netdevsim netdevsim2 netdevsim0: unset [1, 2] type 2 family 0 port 54568 - 0 [ 151.467798][ T8605] netdevsim netdevsim2 netdevsim1: unset [1, 2] type 2 family 0 port 54568 - 0 [ 151.476811][ T8605] netdevsim netdevsim2 netdevsim2: unset [1, 2] type 2 family 0 port 54568 - 0 [ 151.485802][ T8605] netdevsim netdevsim2 netdevsim3: unset [1, 2] type 2 family 0 port 54568 - 0 [ 151.495045][ T8605] netdevsim netdevsim2 netdevsim0: unset [1, 1] type 2 family 0 port 50197 - 0 [ 151.504629][ T8605] netdevsim netdevsim2 netdevsim1: unset [1, 1] type 2 family 0 port 50197 - 0 [ 151.513649][ T8605] netdevsim netdevsim2 netdevsim2: unset [1, 1] type 2 family 0 port 50197 - 0 18:09:14 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) [ 151.522921][ T8605] netdevsim netdevsim2 netdevsim3: unset [1, 1] type 2 family 0 port 50197 - 0 18:09:14 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:14 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x28, 0x2, [@TCA_FW_CLASSID={0x8}]}}]}, 0x38}}, 0x0) 18:09:15 executing program 4: r0 = socket(0x1, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 18:09:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 2: r0 = syz_io_uring_setup(0xf00, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_setup(0xf00, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r4, r2, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, {0x0, r3}}) io_uring_enter(r0, 0x4, 0x0, 0x0, 0x0, 0x0) 18:09:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 2: r0 = syz_io_uring_setup(0xf00, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_setup(0xf00, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r4, r2, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, {0x0, r3}}) io_uring_enter(r0, 0x4, 0x0, 0x0, 0x0, 0x0) 18:09:15 executing program 4: r0 = socket(0x1, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 18:09:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) 18:09:15 executing program 2: r0 = syz_io_uring_setup(0xf00, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_setup(0xf00, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r4, r2, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, {0x0, r3}}) io_uring_enter(r0, 0x4, 0x0, 0x0, 0x0, 0x0) 18:09:15 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) fchown(r4, 0xee01, 0xee00) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/34}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffff80000000) sendfile(r3, r5, 0x0, 0x20000000d67) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0x867) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) getdents(r6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x2) getdents(r7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1}}) [ 152.582718][ T26] audit: type=1400 audit(1691777355.305:1528): avc: denied { override_creds } for pid=8671 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 152.587740][ T8678] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=8678 comm=syz-executor.0 18:09:15 executing program 4: r0 = socket(0x1, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 18:09:15 executing program 2: r0 = syz_io_uring_setup(0xf00, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_setup(0xf00, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r4, r2, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, {0x0, r3}}) io_uring_enter(r0, 0x4, 0x0, 0x0, 0x0, 0x0) 18:09:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x28, 0x2, [@TCA_FW_CLASSID={0x8}]}}]}, 0x38}}, 0x0) 18:09:15 executing program 4: r0 = socket(0x1, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 18:09:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 18:09:15 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0xa, 0x0) tee(r0, r1, 0x100000000, 0x0) 18:09:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 18:09:15 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000003a80)=[&(0x7f00000000c0)={0x2600, 0x400000000000, 0x0, 0x1, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x1, &(0x7f0000000600)=[{}], &(0x7f0000000540)) [ 152.709218][ T8678] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 152.744665][ T8678] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:09:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 18:09:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 18:09:15 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0xa, 0x0) tee(r0, r1, 0x100000000, 0x0) [ 152.817652][ T8713] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=8713 comm=syz-executor.0 [ 152.839826][ T8713] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 152.861335][ T8713] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:09:16 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0xa, 0x0) tee(r0, r1, 0x100000000, 0x0) 18:09:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 18:09:16 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 18:09:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x28, 0x2, [@TCA_FW_CLASSID={0x8}]}}]}, 0x38}}, 0x0) 18:09:16 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000003a80)=[&(0x7f00000000c0)={0x2600, 0x400000000000, 0x0, 0x1, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x1, &(0x7f0000000600)=[{}], &(0x7f0000000540)) 18:09:16 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 18:09:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 18:09:16 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 18:09:16 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 18:09:16 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0xa, 0x0) tee(r0, r1, 0x100000000, 0x0) [ 153.533689][ T8728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=8728 comm=syz-executor.0 [ 153.565088][ T8728] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:09:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x28, 0x2, [@TCA_FW_CLASSID={0x8}]}}]}, 0x38}}, 0x0) 18:09:16 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000003a80)=[&(0x7f00000000c0)={0x2600, 0x400000000000, 0x0, 0x1, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x1, &(0x7f0000000600)=[{}], &(0x7f0000000540)) 18:09:16 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$xdp(0x2c, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 18:09:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000056c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f00000024c0)={0xa, 0x4e24, 0x0, @remote, 0x5c69}, 0x1c, 0x0, 0x0, &(0x7f00000025c0)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback={0xfec0ffff00000000}}}}], 0x28}}], 0x2, 0x0) [ 153.586971][ T8728] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:09:16 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000056c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f00000024c0)={0xa, 0x4e24, 0x0, @remote, 0x5c69}, 0x1c, 0x0, 0x0, &(0x7f00000025c0)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback={0xfec0ffff00000000}}}}], 0x28}}], 0x2, 0x0) [ 153.655986][ T8746] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=8746 comm=syz-executor.0 [ 153.687839][ T8746] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:09:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000056c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f00000024c0)={0xa, 0x4e24, 0x0, @remote, 0x5c69}, 0x1c, 0x0, 0x0, &(0x7f00000025c0)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback={0xfec0ffff00000000}}}}], 0x28}}], 0x2, 0x0) 18:09:16 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 18:09:16 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000003a80)=[&(0x7f00000000c0)={0x2600, 0x400000000000, 0x0, 0x1, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x1, &(0x7f0000000600)=[{}], &(0x7f0000000540)) [ 153.694214][ T8751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53702 sclass=netlink_route_socket pid=8751 comm=syz-executor.5 [ 153.710657][ T26] audit: type=1400 audit(1691777356.425:1529): avc: denied { write } for pid=8738 comm="syz-executor.1" path="socket:[34437]" dev="sockfs" ino=34437 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 153.734976][ T8746] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:09:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000fc0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8}, {0xc, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}]]}}}]}, 0x38}}, 0x0) 18:09:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x0, 0x2b8, 0x25c, 0x0, 0x7, 0x1f0, 0x3a8, 0x3a8, 0x1f0, 0x3a8, 0x7fffffe, 0x0, {[{{@uncond, 0x10a, 0x108, 0x128, 0xa010000, {}, [@common=@unspec=@devgroup={{0x38}, {0x4}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@TRACE={0x20, 'TRACE\x00', 0x2}}, {{@ipv6={@local, @mcast2, [], [], 'wg2\x00', 'veth0_to_bond\x00'}, 0xc103, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 18:09:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000056c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f00000024c0)={0xa, 0x4e24, 0x0, @remote, 0x5c69}, 0x1c, 0x0, 0x0, &(0x7f00000025c0)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback={0xfec0ffff00000000}}}}], 0x28}}], 0x2, 0x0) 18:09:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x0, 0x2b8, 0x25c, 0x0, 0x7, 0x1f0, 0x3a8, 0x3a8, 0x1f0, 0x3a8, 0x7fffffe, 0x0, {[{{@uncond, 0x10a, 0x108, 0x128, 0xa010000, {}, [@common=@unspec=@devgroup={{0x38}, {0x4}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@TRACE={0x20, 'TRACE\x00', 0x2}}, {{@ipv6={@local, @mcast2, [], [], 'wg2\x00', 'veth0_to_bond\x00'}, 0xc103, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 18:09:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x0, 0x2b8, 0x25c, 0x0, 0x7, 0x1f0, 0x3a8, 0x3a8, 0x1f0, 0x3a8, 0x7fffffe, 0x0, {[{{@uncond, 0x10a, 0x108, 0x128, 0xa010000, {}, [@common=@unspec=@devgroup={{0x38}, {0x4}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@TRACE={0x20, 'TRACE\x00', 0x2}}, {{@ipv6={@local, @mcast2, [], [], 'wg2\x00', 'veth0_to_bond\x00'}, 0xc103, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 153.751802][ T8751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32790 sclass=netlink_route_socket pid=8751 comm=syz-executor.5 [ 153.769140][ T26] audit: type=1400 audit(1691777356.475:1530): avc: denied { accept } for pid=8748 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 153.791970][ T8751] geneve2: entered promiscuous mode [ 153.797325][ T8751] geneve2: entered allmulticast mode 18:09:17 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$xdp(0x2c, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 18:09:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x0, 0x2b8, 0x25c, 0x0, 0x7, 0x1f0, 0x3a8, 0x3a8, 0x1f0, 0x3a8, 0x7fffffe, 0x0, {[{{@uncond, 0x10a, 0x108, 0x128, 0xa010000, {}, [@common=@unspec=@devgroup={{0x38}, {0x4}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@TRACE={0x20, 'TRACE\x00', 0x2}}, {{@ipv6={@local, @mcast2, [], [], 'wg2\x00', 'veth0_to_bond\x00'}, 0xc103, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 18:09:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x26e1, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000101, 0x0, 0x0) 18:09:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@RTA_OIF={0x8, 0x1e}]}, 0x24}}, 0x0) 18:09:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000fc0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8}, {0xc, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}]]}}}]}, 0x38}}, 0x0) 18:09:17 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:17 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000fc0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8}, {0xc, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}]]}}}]}, 0x38}}, 0x0) [ 154.490661][ T8771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53702 sclass=netlink_route_socket pid=8771 comm=syz-executor.5 [ 154.520801][ T8771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32790 sclass=netlink_route_socket pid=8771 comm=syz-executor.5 18:09:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@RTA_OIF={0x8, 0x1e}]}, 0x24}}, 0x0) 18:09:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x26e1, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000101, 0x0, 0x0) [ 154.543855][ T8771] geneve2: entered promiscuous mode [ 154.549155][ T8771] geneve2: entered allmulticast mode [ 154.551373][ T8783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53702 sclass=netlink_route_socket pid=8783 comm=syz-executor.0 18:09:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@RTA_OIF={0x8, 0x1e}]}, 0x24}}, 0x0) 18:09:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@RTA_OIF={0x8, 0x1e}]}, 0x24}}, 0x0) [ 154.584121][ T8783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32790 sclass=netlink_route_socket pid=8783 comm=syz-executor.0 [ 154.620856][ T8783] geneve2: entered promiscuous mode [ 154.626126][ T8783] geneve2: entered allmulticast mode 18:09:18 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$xdp(0x2c, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 18:09:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000fc0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8}, {0xc, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}]]}}}]}, 0x38}}, 0x0) 18:09:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x26e1, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000101, 0x0, 0x0) 18:09:18 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:18 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:18 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x26e1, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000101, 0x0, 0x0) [ 155.386605][ T8802] geneve2: entered promiscuous mode [ 155.391872][ T8802] geneve2: entered allmulticast mode [ 155.412908][ T8796] geneve2: entered promiscuous mode [ 155.418289][ T8796] geneve2: entered allmulticast mode 18:09:18 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) socket(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$unix(0x1, 0x5, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100000000000000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x10000100000003) [ 155.435913][ T8801] geneve2: entered promiscuous mode [ 155.441342][ T8801] geneve2: entered allmulticast mode [ 155.473863][ T8807] geneve2: entered promiscuous mode [ 155.479284][ T8807] geneve2: entered allmulticast mode 18:09:18 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:18 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:18 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) [ 155.581813][ T8814] geneve2: entered promiscuous mode [ 155.587227][ T8814] geneve2: entered allmulticast mode [ 155.593828][ T26] audit: type=1400 audit(1691777358.315:1531): avc: denied { create } for pid=8811 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 155.624012][ T8816] geneve2: entered promiscuous mode [ 155.629332][ T8816] geneve2: entered allmulticast mode [ 155.644403][ T8819] geneve2: entered promiscuous mode [ 155.649703][ T8819] geneve2: entered allmulticast mode 18:09:18 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$xdp(0x2c, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 18:09:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:18 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'pimreg1\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x11, 0x2, @mcast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x50}}, 0x0) 18:09:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) 18:09:18 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) socket(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$unix(0x1, 0x5, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100000000000000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x10000100000003) 18:09:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'pimreg1\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x11, 0x2, @mcast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x50}}, 0x0) 18:09:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'pimreg1\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x11, 0x2, @mcast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x50}}, 0x0) 18:09:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'pimreg1\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x11, 0x2, @mcast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x50}}, 0x0) [ 156.254251][ T8828] geneve2: entered promiscuous mode [ 156.259608][ T8828] geneve2: entered allmulticast mode 18:09:19 executing program 5: keyctl$unlink(0x4, 0x0, 0x0) keyctl$clear(0x7, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) 18:09:19 executing program 5: keyctl$unlink(0x4, 0x0, 0x0) keyctl$clear(0x7, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) [ 156.311380][ T8823] geneve2: entered promiscuous mode [ 156.316694][ T8823] geneve2: entered allmulticast mode 18:09:19 executing program 5: keyctl$unlink(0x4, 0x0, 0x0) keyctl$clear(0x7, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) [ 156.360244][ T8826] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 156.392594][ T8841] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 18:09:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) 18:09:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) socket(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$unix(0x1, 0x5, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100000000000000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x10000100000003) 18:09:19 executing program 5: keyctl$unlink(0x4, 0x0, 0x0) keyctl$clear(0x7, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) 18:09:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) 18:09:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r2}, 0x3f) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000a40), 0x200, 0x121000) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x79, 0x8, 0x2, 0x0, 0x1}, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r4, &(0x7f00000004c0), &(0x7f0000000400)=@udp6=r5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000000), &(0x7f00000000c0)=@udp6}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="9add2fd6", @ANYRES32=0x1, @ANYBLOB="00000000fe020000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x2d, &(0x7f0000000740)=""/45, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0x0, 0x7, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[r1, r3, r4]}, 0x80) socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000000)=0xfff, 0x4) sendmsg$nl_xfrm(r6, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000000000000000000000000001ac1e000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa744ebc9f22545a6689a92e7c04ec83e7a8175307c0c7ead288006e89d3a2c57eaa8514c93f4997b1228c17bc6a002d7b3e3b8810c01b0994205060b9b108c468b3fce293059c6c0be3674599a5f0e872b94b3e75ba0068c6fee4766d696e8bd519bc4890d9f7eb871054e5cb5d1c704ec39dfc6c84e5f4dd244b66af"], 0xb8}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)={0x1c, r10, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="34000000c6d109215e03414534c01dabc5d59f26d6e899d6b163d52fb57ef81409a86bf387f5ead68ec2de68484c6b6776475aa8a8476f84a5ace9d73402ab563cb278", @ANYRES16=r10, @ANYBLOB="8b9d2abd7000fedbde2504000000080003000400000005000600fa40000008000400060000527216e80004000000", @ANYRES32=r7], 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r8, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0xfea3) r11 = accept4(r0, &(0x7f0000000280)=@llc, &(0x7f00000000c0)=0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000b80)=ANY=[@ANYBLOB="fe040000000000000094d071074dcb635200", @ANYRES16=0x0, @ANYBLOB="000227bd7000fedbdf250400000008000400090300003c0001800800090016000000080005000000000005000500040000000800050000000000080006007772720008000b00736970000800060073656400563404bbaeef0e23afc333b31472da76ed76c3dc0a7e39539e810724617350ca806e7ea94c03651dbd67a56c556eae1cec3a094b4bc04edc6d9668e4aa724df9"], 0x58}, 0x1, 0x0, 0x0, 0x2000050}, 0x2) sendmsg$nl_generic(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000016805531ddffffff000000000a0000001800008014000100ff0200000000000081d7ddba1e98b3d7"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000400)={0x28, r10, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0xe4e77698e339b488, 0x1, @loopback}]}, 0x28}}, 0x801) sendmsg$DEVLINK_CMD_RATE_DEL(r11, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000a80)=ANY=[@ANYBLOB="04010001", @ANYRES16=0x0, @ANYRES64=r6], 0x13c}, 0x1, 0x0, 0x0, 0x8000}, 0xc010) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5, 0xa00}}]}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x68}}, 0x20000040) 18:09:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) 18:09:19 executing program 5: keyctl$unlink(0x4, 0x0, 0x0) keyctl$clear(0x7, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) 18:09:19 executing program 5: keyctl$unlink(0x4, 0x0, 0x0) keyctl$clear(0x7, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) 18:09:19 executing program 5: keyctl$unlink(0x4, 0x0, 0x0) keyctl$clear(0x7, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) [ 157.103086][ T8854] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 157.137291][ T8855] geneve2: entered promiscuous mode [ 157.142543][ T8855] geneve2: entered allmulticast mode 18:09:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0xc0101282, 0xffffffffffffffff) 18:09:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0xc0101282, 0xffffffffffffffff) 18:09:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) [ 157.217505][ T8866] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 157.239300][ T8868] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 157.253512][ T8859] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 157.307852][ T8875] netlink: 'syz-executor.2': attribute type 8 has an invalid length. 18:09:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) socket(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) socket$unix(0x1, 0x5, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d0100000000000000000500000008000300", @ANYRES32=r7], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff830500000000000000", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x10000100000003) 18:09:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0xc0101282, 0xffffffffffffffff) 18:09:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) 18:09:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 18:09:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) 18:09:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) 18:09:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0xc0101282, 0xffffffffffffffff) 18:09:20 executing program 5: r0 = io_uring_setup(0x1c40, &(0x7f0000000180)) r1 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_enter(r0, 0x2cb8, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/203, 0xfffffdef) close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) 18:09:20 executing program 2: ioctl$SG_BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 157.552110][ T8885] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 157.578817][ T8883] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 18:09:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) 18:09:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@delchain={0x44, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x8, 0xa, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x8, 0x289}]}]}]}}]}, 0x44}}, 0x0) 18:09:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 157.606552][ T8891] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 157.610803][ T26] audit: type=1400 audit(1691777360.335:1532): avc: denied { read } for pid=8890 comm="syz-executor.5" path="socket:[34787]" dev="sockfs" ino=34787 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 157.693561][ T8897] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 157.713294][ T8900] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 18:09:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1f, &(0x7f0000000000)="ca7a39b1", 0x4) 18:09:20 executing program 5: r0 = io_uring_setup(0x1c40, &(0x7f0000000180)) r1 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_enter(r0, 0x2cb8, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/203, 0xfffffdef) close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) 18:09:20 executing program 0: r0 = io_uring_setup(0x1c40, &(0x7f0000000180)) r1 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_enter(r0, 0x2cb8, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/203, 0xfffffdef) close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) 18:09:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61107800000000006113380000000000bfa000000000000007000000f8ffffffd50301001774000095000000000000006916000000000000bf67000000000000350607000fff07201703000020000000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8e901fd03c16dfda44221b235c8ac86d8a297dff0445a15f3ae8e431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae8e6a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000001000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13671d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d80000000000006a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff130600000000000000c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c747664e9f7478f82eae697502bd1a56e2aa81c66b1bc50dc6a7d6eb4318809094fa3c836be62ae753dd274"], &(0x7f0000000100)='GPL\x00'}, 0x48) 18:09:21 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xc6, 0x2, 0x3f, 0x7, 0x0, 0x3f, 0x8808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x6, @perf_config_ext={0x4, 0x7fffffffffffffff}, 0x19103, 0x7f, 0x2, 0x7, 0x5, 0x3f, 0x23, 0x0, 0x2, 0x0, 0x8000000000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) 18:09:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1f, &(0x7f0000000000)="ca7a39b1", 0x4) 18:09:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/62, 0x18) getdents64(r0, 0x0, 0x18) 18:09:21 executing program 0: r0 = io_uring_setup(0x1c40, &(0x7f0000000180)) r1 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_enter(r0, 0x2cb8, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/203, 0xfffffdef) close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) 18:09:21 executing program 5: r0 = io_uring_setup(0x1c40, &(0x7f0000000180)) r1 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_enter(r0, 0x2cb8, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/203, 0xfffffdef) close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) 18:09:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1f, &(0x7f0000000000)="ca7a39b1", 0x4) 18:09:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/62, 0x18) getdents64(r0, 0x0, 0x18) [ 158.367439][ T26] audit: type=1400 audit(1691777361.095:1533): avc: denied { mount } for pid=8915 comm="syz-executor.2" name="/" dev="configfs" ino=15237 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 18:09:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1f, &(0x7f0000000000)="ca7a39b1", 0x4) [ 158.444320][ T26] audit: type=1400 audit(1691777361.125:1534): avc: denied { read } for pid=8915 comm="syz-executor.2" name="/" dev="configfs" ino=15237 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 158.466878][ T26] audit: type=1400 audit(1691777361.125:1535): avc: denied { open } for pid=8915 comm="syz-executor.2" path="/root/syzkaller-testdir345371808/syzkaller.G7l3Zs/309/file1" dev="configfs" ino=15237 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 18:09:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/62, 0x18) getdents64(r0, 0x0, 0x18) 18:09:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/62, 0x18) getdents64(r0, 0x0, 0x18) 18:09:21 executing program 0: r0 = io_uring_setup(0x1c40, &(0x7f0000000180)) r1 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_enter(r0, 0x2cb8, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/203, 0xfffffdef) close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) [ 158.494395][ T26] audit: type=1400 audit(1691777361.135:1536): avc: denied { unmount } for pid=3086 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 18:09:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61107800000000006113380000000000bfa000000000000007000000f8ffffffd50301001774000095000000000000006916000000000000bf67000000000000350607000fff07201703000020000000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8e901fd03c16dfda44221b235c8ac86d8a297dff0445a15f3ae8e431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae8e6a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000001000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13671d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d80000000000006a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff130600000000000000c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c747664e9f7478f82eae697502bd1a56e2aa81c66b1bc50dc6a7d6eb4318809094fa3c836be62ae753dd274"], &(0x7f0000000100)='GPL\x00'}, 0x48) 18:09:22 executing program 5: r0 = io_uring_setup(0x1c40, &(0x7f0000000180)) r1 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_enter(r0, 0x2cb8, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/203, 0xfffffdef) close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) 18:09:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/62, 0x18) getdents64(r0, 0x0, 0x18) 18:09:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/62, 0x18) getdents64(r0, 0x0, 0x18) 18:09:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000858600e8ffffffffffffff000080", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002300)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x20}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r5, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4004}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x64, r7, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x12}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x44}}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x64}}, 0x2004c011) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xffffffff, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8, 0x2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 18:09:22 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xc6, 0x2, 0x3f, 0x7, 0x0, 0x3f, 0x8808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x6, @perf_config_ext={0x4, 0x7fffffffffffffff}, 0x19103, 0x7f, 0x2, 0x7, 0x5, 0x3f, 0x23, 0x0, 0x2, 0x0, 0x8000000000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) 18:09:22 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xc6, 0x2, 0x3f, 0x7, 0x0, 0x3f, 0x8808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x6, @perf_config_ext={0x4, 0x7fffffffffffffff}, 0x19103, 0x7f, 0x2, 0x7, 0x5, 0x3f, 0x23, 0x0, 0x2, 0x0, 0x8000000000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) 18:09:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/62, 0x18) getdents64(r0, 0x0, 0x18) [ 159.288691][ T8949] __nla_validate_parse: 8 callbacks suppressed [ 159.288710][ T8949] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:09:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@ipv4_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0xd}}, 0x1c}}, 0x0) 18:09:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) [ 159.356469][ T8955] 8021q: adding VLAN 0 to HW filter on device bond1 [ 159.367620][ T8955] team0: Port device bond1 added 18:09:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000858600e8ffffffffffffff000080", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002300)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x20}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r5, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4004}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x64, r7, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x12}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x44}}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x64}}, 0x2004c011) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xffffffff, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8, 0x2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 18:09:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@ipv4_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0xd}}, 0x1c}}, 0x0) [ 159.421781][ T8962] serio: Serial port pts0 [ 159.473447][ T8966] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 159.566497][ T8972] 8021q: adding VLAN 0 to HW filter on device bond2 [ 159.625115][ T8972] team0: Port device bond2 added 18:09:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 18:09:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@ipv4_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0xd}}, 0x1c}}, 0x0) 18:09:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) 18:09:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000858600e8ffffffffffffff000080", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002300)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x20}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r5, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4004}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x64, r7, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x12}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x44}}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x64}}, 0x2004c011) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xffffffff, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8, 0x2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 18:09:22 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xc6, 0x2, 0x3f, 0x7, 0x0, 0x3f, 0x8808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x6, @perf_config_ext={0x4, 0x7fffffffffffffff}, 0x19103, 0x7f, 0x2, 0x7, 0x5, 0x3f, 0x23, 0x0, 0x2, 0x0, 0x8000000000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) 18:09:22 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xc6, 0x2, 0x3f, 0x7, 0x0, 0x3f, 0x8808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x6, @perf_config_ext={0x4, 0x7fffffffffffffff}, 0x19103, 0x7f, 0x2, 0x7, 0x5, 0x3f, 0x23, 0x0, 0x2, 0x0, 0x8000000000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) 18:09:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@ipv4_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0xd}}, 0x1c}}, 0x0) [ 160.205284][ T8978] serio: Serial port pts0 [ 160.214279][ T8983] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:09:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) [ 160.293509][ T8983] 8021q: adding VLAN 0 to HW filter on device bond3 [ 160.320180][ T8995] serio: Serial port pts1 [ 160.329778][ T8983] team0: Port device bond3 added 18:09:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) 18:09:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000858600e8ffffffffffffff000080", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002300)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x20}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r5, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4004}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x64, r7, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x12}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x44}}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x64}}, 0x2004c011) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xffffffff, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8, 0x2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 160.444485][ T9001] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 160.461198][ T9002] serio: Serial port pts0 18:09:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) [ 160.490015][ T9001] 8021q: adding VLAN 0 to HW filter on device bond4 [ 160.508482][ T9001] team0: Port device bond4 added 18:09:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) [ 160.544594][ T9007] serio: Serial port pts1 [ 160.610125][ T9011] serio: Serial port pts2 18:09:23 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xc6, 0x2, 0x3f, 0x7, 0x0, 0x3f, 0x8808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x6, @perf_config_ext={0x4, 0x7fffffffffffffff}, 0x19103, 0x7f, 0x2, 0x7, 0x5, 0x3f, 0x23, 0x0, 0x2, 0x0, 0x8000000000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) 18:09:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) 18:09:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) 18:09:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) 18:09:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) 18:09:23 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xc6, 0x2, 0x3f, 0x7, 0x0, 0x3f, 0x8808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x6, @perf_config_ext={0x4, 0x7fffffffffffffff}, 0x19103, 0x7f, 0x2, 0x7, 0x5, 0x3f, 0x23, 0x0, 0x2, 0x0, 0x8000000000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) [ 161.145390][ T9021] serio: Serial port pts0 [ 161.150204][ T9022] serio: Serial port pts1 [ 161.160845][ T9024] serio: Serial port pts2 [ 161.177920][ T9026] serio: Serial port pts3 18:09:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x14, &(0x7f0000000080)={@dev, @link_local, @val={@void}, {@mpls_mc={0x8100, {[], @generic='/J'}}}}, 0x0) 18:09:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) 18:09:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000050000000900010073797a300000000028000000000a03000000000000000000050000000900010073797a3000000000080002400000000128000000000a05000000000000000000050000000900010073797a3000000000080002"], 0x98}}, 0x0) 18:09:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) [ 161.351450][ T9045] serio: Serial port pts0 18:09:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000050000000900010073797a300000000028000000000a03000000000000000000050000000900010073797a3000000000080002400000000128000000000a05000000000000000000050000000900010073797a3000000000080002"], 0x98}}, 0x0) 18:09:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x14, &(0x7f0000000080)={@dev, @link_local, @val={@void}, {@mpls_mc={0x8100, {[], @generic='/J'}}}}, 0x0) [ 161.382875][ T9050] serio: Serial port pts1 18:09:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00000001c0)) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x4100}], 0x2, 0x0, &(0x7f0000000180)={[0x3]}, 0x8) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) 18:09:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x14, &(0x7f0000000080)={@dev, @link_local, @val={@void}, {@mpls_mc={0x8100, {[], @generic='/J'}}}}, 0x0) 18:09:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000050000000900010073797a300000000028000000000a03000000000000000000050000000900010073797a3000000000080002400000000128000000000a05000000000000000000050000000900010073797a3000000000080002"], 0x98}}, 0x0) 18:09:24 executing program 0: memfd_create(0x0, 0x1c) 18:09:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2af, &(0x7f0000000240)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0x0, 0x100000000, 0x6750}) [ 161.705831][ T9067] serio: Serial port pts0 [ 161.755955][ T9071] loop4: detected capacity change from 0 to 128 18:09:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000047c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast1}]}}}]}, 0x44}}, 0x0) 18:09:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x14, &(0x7f0000000080)={@dev, @link_local, @val={@void}, {@mpls_mc={0x8100, {[], @generic='/J'}}}}, 0x0) 18:09:24 executing program 0: memfd_create(0x0, 0x1c) 18:09:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000050000000900010073797a300000000028000000000a03000000000000000000050000000900010073797a3000000000080002400000000128000000000a05000000000000000000050000000900010073797a3000000000080002"], 0x98}}, 0x0) 18:09:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2af, &(0x7f0000000240)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0x0, 0x100000000, 0x6750}) 18:09:24 executing program 2: syz_emit_ethernet(0x8a, &(0x7f0000000040)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x10, 0x0, 0x0, 0x0, {[@nop={0x2}, @fastopen={0x18, 0x6, "241ea72e"}, @timestamp={0x8, 0xa}, @sack={0x5, 0xe, [0x0, 0x0, 0x0]}, @timestamp={0x8, 0xa}, @window={0x3, 0x3}, @fastopen={0x22, 0x7, "59366cea6a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 18:09:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0xb, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 18:09:24 executing program 0: memfd_create(0x0, 0x1c) 18:09:24 executing program 5: modify_ldt$write(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x10) 18:09:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2af, &(0x7f0000000240)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0x0, 0x100000000, 0x6750}) [ 162.002358][ T9082] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 162.012611][ T9081] loop4: detected capacity change from 0 to 128 18:09:24 executing program 0: memfd_create(0x0, 0x1c) 18:09:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000047c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast1}]}}}]}, 0x44}}, 0x0) 18:09:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0xb, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 18:09:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1ad}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0x4, 0x4, 0x15}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x26}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000000c0)={@map=r1, r0, 0x5}, 0x10) 18:09:24 executing program 5: modify_ldt$write(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x10) 18:09:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0xb, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 18:09:24 executing program 2: syz_emit_ethernet(0x8a, &(0x7f0000000040)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x10, 0x0, 0x0, 0x0, {[@nop={0x2}, @fastopen={0x18, 0x6, "241ea72e"}, @timestamp={0x8, 0xa}, @sack={0x5, 0xe, [0x0, 0x0, 0x0]}, @timestamp={0x8, 0xa}, @window={0x3, 0x3}, @fastopen={0x22, 0x7, "59366cea6a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) [ 162.097687][ T9093] loop4: detected capacity change from 0 to 128 [ 162.112373][ T9097] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1ad}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0x4, 0x4, 0x15}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x26}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000000c0)={@map=r1, r0, 0x5}, 0x10) 18:09:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000047c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast1}]}}}]}, 0x44}}, 0x0) 18:09:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2af, &(0x7f0000000240)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0x0, 0x100000000, 0x6750}) 18:09:24 executing program 5: modify_ldt$write(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x10) 18:09:24 executing program 2: syz_emit_ethernet(0x8a, &(0x7f0000000040)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x10, 0x0, 0x0, 0x0, {[@nop={0x2}, @fastopen={0x18, 0x6, "241ea72e"}, @timestamp={0x8, 0xa}, @sack={0x5, 0xe, [0x0, 0x0, 0x0]}, @timestamp={0x8, 0xa}, @window={0x3, 0x3}, @fastopen={0x22, 0x7, "59366cea6a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 18:09:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0xb, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) [ 162.156779][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 162.165687][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 18:09:24 executing program 5: modify_ldt$write(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x10) 18:09:24 executing program 2: syz_emit_ethernet(0x8a, &(0x7f0000000040)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x10, 0x0, 0x0, 0x0, {[@nop={0x2}, @fastopen={0x18, 0x6, "241ea72e"}, @timestamp={0x8, 0xa}, @sack={0x5, 0xe, [0x0, 0x0, 0x0]}, @timestamp={0x8, 0xa}, @window={0x3, 0x3}, @fastopen={0x22, 0x7, "59366cea6a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 18:09:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r1, 0x6a046bdee3f31c09, 0x0, 0x0, {0x39}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 18:09:25 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000002740)) io_setup(0x1, &(0x7f00000012c0)) 18:09:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000047c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast1}]}}}]}, 0x44}}, 0x0) [ 162.216841][ T9117] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 162.228014][ T9111] loop4: detected capacity change from 0 to 128 18:09:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1ad}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0x4, 0x4, 0x15}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x26}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000000c0)={@map=r1, r0, 0x5}, 0x10) 18:09:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getgroups(0x2, &(0x7f0000001080)=[0xee01, 0xffffffffffffffff]) keyctl$chown(0x4, r0, 0xee01, r1) keyctl$setperm(0x5, r0, 0x29022001) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 18:09:25 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_proto_private(r0, 0x89ee, &(0x7f0000000140)) 18:09:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r1, 0x6a046bdee3f31c09, 0x0, 0x0, {0x39}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 18:09:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getgroups(0x2, &(0x7f0000001080)=[0xee01, 0xffffffffffffffff]) keyctl$chown(0x4, r0, 0xee01, r1) keyctl$setperm(0x5, r0, 0x29022001) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 18:09:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1ad}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0x4, 0x4, 0x15}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x26}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000000c0)={@map=r1, r0, 0x5}, 0x10) [ 162.297170][ T9128] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getgroups(0x2, &(0x7f0000001080)=[0xee01, 0xffffffffffffffff]) keyctl$chown(0x4, r0, 0xee01, r1) keyctl$setperm(0x5, r0, 0x29022001) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 18:09:25 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_proto_private(r0, 0x89ee, &(0x7f0000000140)) 18:09:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d80)=@newqdisc={0xb8, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x88, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x24, 0x2, 0x0, 0x1, [{0x4, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}]}]}}]}, 0xb8}}, 0x0) 18:09:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r1, 0x6a046bdee3f31c09, 0x0, 0x0, {0x39}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 162.354083][ T26] audit: type=1400 audit(1691777365.075:1537): avc: denied { ioctl } for pid=9137 comm="syz-executor.2" path="socket:[36179]" dev="sockfs" ino=36179 ioctlcmd=0x89ee scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 18:09:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) fspick(0xffffffffffffffff, 0x0, 0x0) 18:09:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getgroups(0x2, &(0x7f0000001080)=[0xee01, 0xffffffffffffffff]) keyctl$chown(0x4, r0, 0xee01, r1) keyctl$setperm(0x5, r0, 0x29022001) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 18:09:25 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_proto_private(r0, 0x89ee, &(0x7f0000000140)) 18:09:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getgroups(0x2, &(0x7f0000001080)=[0xee01, 0xffffffffffffffff]) keyctl$chown(0x4, r0, 0xee01, r1) keyctl$setperm(0x5, r0, 0x29022001) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 18:09:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) fspick(0xffffffffffffffff, 0x0, 0x0) 18:09:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r1, 0x6a046bdee3f31c09, 0x0, 0x0, {0x39}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 18:09:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d80)=@newqdisc={0xb8, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x88, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x24, 0x2, 0x0, 0x1, [{0x4, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}]}]}}]}, 0xb8}}, 0x0) 18:09:25 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_proto_private(r0, 0x89ee, &(0x7f0000000140)) 18:09:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getgroups(0x2, &(0x7f0000001080)=[0xee01, 0xffffffffffffffff]) keyctl$chown(0x4, r0, 0xee01, r1) keyctl$setperm(0x5, r0, 0x29022001) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 18:09:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getgroups(0x2, &(0x7f0000001080)=[0xee01, 0xffffffffffffffff]) keyctl$chown(0x4, r0, 0xee01, r1) keyctl$setperm(0x5, r0, 0x29022001) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) 18:09:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) fspick(0xffffffffffffffff, 0x0, 0x0) 18:09:25 executing program 1: clock_adjtime(0x0, &(0x7f0000000180)={0x49d, 0x100000001, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) 18:09:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d80)=@newqdisc={0xb8, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x88, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x24, 0x2, 0x0, 0x1, [{0x4, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}]}]}}]}, 0xb8}}, 0x0) 18:09:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000080)) 18:09:25 executing program 4: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) fspick(0xffffffffffffffff, 0x0, 0x0) 18:09:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000d80)=@newqdisc={0xb8, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x88, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x24, 0x2, 0x0, 0x1, [{0x4, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}]}]}}]}, 0xb8}}, 0x0) 18:09:25 executing program 1: clock_adjtime(0x0, &(0x7f0000000180)={0x49d, 0x100000001, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) 18:09:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x7a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) 18:09:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000080)) 18:09:25 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2287, &(0x7f0000001640)={0x1000, ""/4096}) 18:09:25 executing program 1: clock_adjtime(0x0, &(0x7f0000000180)={0x49d, 0x100000001, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) 18:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0xe, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 18:09:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x7a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) 18:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0xe, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 18:09:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000080)) 18:09:25 executing program 4: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:25 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2287, &(0x7f0000001640)={0x1000, ""/4096}) 18:09:25 executing program 1: clock_adjtime(0x0, &(0x7f0000000180)={0x49d, 0x100000001, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) 18:09:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000080)) 18:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0xe, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 18:09:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x7a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) 18:09:25 executing program 2: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0xe, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 18:09:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x7a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) 18:09:25 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2287, &(0x7f0000001640)={0x1000, ""/4096}) 18:09:25 executing program 1: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:25 executing program 0: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:26 executing program 4: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8001) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2287, &(0x7f0000001640)={0x1000, ""/4096}) 18:09:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$cont(0x9, r2, 0x0, 0x0) 18:09:26 executing program 2: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:26 executing program 0: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:26 executing program 1: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:26 executing program 5: r0 = socket(0x1, 0x80002, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'tunl0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) 18:09:26 executing program 5: r0 = socket(0x1, 0x80002, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'tunl0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) 18:09:26 executing program 5: r0 = socket(0x1, 0x80002, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'tunl0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) 18:09:26 executing program 5: r0 = socket(0x1, 0x80002, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'tunl0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) 18:09:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) 18:09:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) 18:09:26 executing program 4: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) 18:09:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$cont(0x9, r2, 0x0, 0x0) 18:09:26 executing program 1: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:26 executing program 2: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:26 executing program 0: unshare(0x68060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) unshare(0x60400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) 18:09:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) 18:09:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8, 0x7, 0x4, 0x1}]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2900000054000100000000000000000007000000", @ANYRES32=0x0], 0x18}}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x169, 0x1e}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003540)={0xf, 0xd, &(0x7f0000001800)=ANY=[], &(0x7f0000000480)='GPL\x00', 0x0, 0xed, &(0x7f0000003240)=""/237, 0x41100, 0x14, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x9}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x0, 0x8c2}, 0x10, 0x0, r2}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a9}, [@call={0x85, 0x0, 0x0, 0x26}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000003c0)='GPL\x00', 0x8, 0x6d, &(0x7f0000000400)=""/109, 0x41100, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x10, 0xa, 0x8, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x26, &(0x7f0000000280)=""/38, 0x41000, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000600)}, 0x80) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) socket(0x10, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) ioctl$int_in(r5, 0x5452, &(0x7f00000002c0)=0x1) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f00000005c0)={0x3, 0x0, 0x49, &(0x7f0000000a00)=""/73}) shutdown(r5, 0x1) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/48, 0x1b}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/124, 0x79}, {&(0x7f0000000400)=""/168, 0xb7}], 0x6, 0x0, 0x0, 0xb7}, 0x40000110) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000900)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x1, 0x2, 0x2, 0x1, 0x1, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8000}, @func, @exit, @alu={0x7, 0x0, 0x1, 0x3, 0x1, 0x80, 0xffffffffffffffff}, @map_fd={0x18, 0x3}], &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0xf3, 0x4}, 0x10, 0x0, r4}, 0x80) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x13, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000001700), 0xffffff1f, r7}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f00000009c0), 0x220c41, 0x0) pipe2$watch_queue(&(0x7f0000000800), 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB="189630a7a2d80243eb5065d288b295451af0ff00000000"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x8}, 0x10, 0x0, r6}, 0x80) 18:09:27 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$cont(0x9, r2, 0x0, 0x0) 18:09:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8, 0x7, 0x4, 0x1}]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2900000054000100000000000000000007000000", @ANYRES32=0x0], 0x18}}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x169, 0x1e}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003540)={0xf, 0xd, &(0x7f0000001800)=ANY=[], &(0x7f0000000480)='GPL\x00', 0x0, 0xed, &(0x7f0000003240)=""/237, 0x41100, 0x14, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x9}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x0, 0x8c2}, 0x10, 0x0, r2}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a9}, [@call={0x85, 0x0, 0x0, 0x26}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000003c0)='GPL\x00', 0x8, 0x6d, &(0x7f0000000400)=""/109, 0x41100, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x10, 0xa, 0x8, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x26, &(0x7f0000000280)=""/38, 0x41000, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000600)}, 0x80) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) socket(0x10, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) ioctl$int_in(r5, 0x5452, &(0x7f00000002c0)=0x1) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f00000005c0)={0x3, 0x0, 0x49, &(0x7f0000000a00)=""/73}) shutdown(r5, 0x1) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/48, 0x1b}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/124, 0x79}, {&(0x7f0000000400)=""/168, 0xb7}], 0x6, 0x0, 0x0, 0xb7}, 0x40000110) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000900)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x1, 0x2, 0x2, 0x1, 0x1, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8000}, @func, @exit, @alu={0x7, 0x0, 0x1, 0x3, 0x1, 0x80, 0xffffffffffffffff}, @map_fd={0x18, 0x3}], &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0xf3, 0x4}, 0x10, 0x0, r4}, 0x80) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x13, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000001700), 0xffffff1f, r7}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f00000009c0), 0x220c41, 0x0) pipe2$watch_queue(&(0x7f0000000800), 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB="189630a7a2d80243eb5065d288b295451af0ff00000000"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x8}, 0x10, 0x0, r6}, 0x80) 18:09:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8, 0x7, 0x4, 0x1}]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2900000054000100000000000000000007000000", @ANYRES32=0x0], 0x18}}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x169, 0x1e}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003540)={0xf, 0xd, &(0x7f0000001800)=ANY=[], &(0x7f0000000480)='GPL\x00', 0x0, 0xed, &(0x7f0000003240)=""/237, 0x41100, 0x14, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x9}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x0, 0x8c2}, 0x10, 0x0, r2}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a9}, [@call={0x85, 0x0, 0x0, 0x26}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000003c0)='GPL\x00', 0x8, 0x6d, &(0x7f0000000400)=""/109, 0x41100, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x10, 0xa, 0x8, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x26, &(0x7f0000000280)=""/38, 0x41000, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000600)}, 0x80) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) socket(0x10, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) ioctl$int_in(r5, 0x5452, &(0x7f00000002c0)=0x1) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f00000005c0)={0x3, 0x0, 0x49, &(0x7f0000000a00)=""/73}) shutdown(r5, 0x1) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/48, 0x1b}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/124, 0x79}, {&(0x7f0000000400)=""/168, 0xb7}], 0x6, 0x0, 0x0, 0xb7}, 0x40000110) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000900)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x1, 0x2, 0x2, 0x1, 0x1, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8000}, @func, @exit, @alu={0x7, 0x0, 0x1, 0x3, 0x1, 0x80, 0xffffffffffffffff}, @map_fd={0x18, 0x3}], &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0xf3, 0x4}, 0x10, 0x0, r4}, 0x80) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x13, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000001700), 0xffffff1f, r7}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f00000009c0), 0x220c41, 0x0) pipe2$watch_queue(&(0x7f0000000800), 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB="189630a7a2d80243eb5065d288b295451af0ff00000000"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x8}, 0x10, 0x0, r6}, 0x80) 18:09:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8, 0x7, 0x4, 0x1}]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2900000054000100000000000000000007000000", @ANYRES32=0x0], 0x18}}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x169, 0x1e}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003540)={0xf, 0xd, &(0x7f0000001800)=ANY=[], &(0x7f0000000480)='GPL\x00', 0x0, 0xed, &(0x7f0000003240)=""/237, 0x41100, 0x14, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x9}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x0, 0x8c2}, 0x10, 0x0, r2}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a9}, [@call={0x85, 0x0, 0x0, 0x26}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000003c0)='GPL\x00', 0x8, 0x6d, &(0x7f0000000400)=""/109, 0x41100, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x10, 0xa, 0x8, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x26, &(0x7f0000000280)=""/38, 0x41000, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000600)}, 0x80) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) socket(0x10, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) ioctl$int_in(r5, 0x5452, &(0x7f00000002c0)=0x1) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f00000005c0)={0x3, 0x0, 0x49, &(0x7f0000000a00)=""/73}) shutdown(r5, 0x1) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/48, 0x1b}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/124, 0x79}, {&(0x7f0000000400)=""/168, 0xb7}], 0x6, 0x0, 0x0, 0xb7}, 0x40000110) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000900)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x1, 0x2, 0x2, 0x1, 0x1, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8000}, @func, @exit, @alu={0x7, 0x0, 0x1, 0x3, 0x1, 0x80, 0xffffffffffffffff}, @map_fd={0x18, 0x3}], &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0xf3, 0x4}, 0x10, 0x0, r4}, 0x80) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x13, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000001700), 0xffffff1f, r7}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f00000009c0), 0x220c41, 0x0) pipe2$watch_queue(&(0x7f0000000800), 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB="189630a7a2d80243eb5065d288b295451af0ff00000000"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x8}, 0x10, 0x0, r6}, 0x80) 18:09:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8, 0x7, 0x4, 0x1}]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2900000054000100000000000000000007000000", @ANYRES32=0x0], 0x18}}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x169, 0x1e}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003540)={0xf, 0xd, &(0x7f0000001800)=ANY=[], &(0x7f0000000480)='GPL\x00', 0x0, 0xed, &(0x7f0000003240)=""/237, 0x41100, 0x14, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x9}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x0, 0x8c2}, 0x10, 0x0, r2}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a9}, [@call={0x85, 0x0, 0x0, 0x26}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000003c0)='GPL\x00', 0x8, 0x6d, &(0x7f0000000400)=""/109, 0x41100, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x10, 0xa, 0x8, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x26, &(0x7f0000000280)=""/38, 0x41000, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000600)}, 0x80) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) socket(0x10, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) ioctl$int_in(r5, 0x5452, &(0x7f00000002c0)=0x1) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f00000005c0)={0x3, 0x0, 0x49, &(0x7f0000000a00)=""/73}) shutdown(r5, 0x1) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/48, 0x1b}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/124, 0x79}, {&(0x7f0000000400)=""/168, 0xb7}], 0x6, 0x0, 0x0, 0xb7}, 0x40000110) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000900)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x1, 0x2, 0x2, 0x1, 0x1, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8000}, @func, @exit, @alu={0x7, 0x0, 0x1, 0x3, 0x1, 0x80, 0xffffffffffffffff}, @map_fd={0x18, 0x3}], &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0xf3, 0x4}, 0x10, 0x0, r4}, 0x80) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x13, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000001700), 0xffffff1f, r7}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f00000009c0), 0x220c41, 0x0) pipe2$watch_queue(&(0x7f0000000800), 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB="189630a7a2d80243eb5065d288b295451af0ff00000000"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x8}, 0x10, 0x0, r6}, 0x80) 18:09:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8, 0x7, 0x4, 0x1}]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2900000054000100000000000000000007000000", @ANYRES32=0x0], 0x18}}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x169, 0x1e}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003540)={0xf, 0xd, &(0x7f0000001800)=ANY=[], &(0x7f0000000480)='GPL\x00', 0x0, 0xed, &(0x7f0000003240)=""/237, 0x41100, 0x14, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x9}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x0, 0x8c2}, 0x10, 0x0, r2}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a9}, [@call={0x85, 0x0, 0x0, 0x26}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000003c0)='GPL\x00', 0x8, 0x6d, &(0x7f0000000400)=""/109, 0x41100, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x10, 0xa, 0x8, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x26, &(0x7f0000000280)=""/38, 0x41000, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000600)}, 0x80) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) socket(0x10, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) ioctl$int_in(r5, 0x5452, &(0x7f00000002c0)=0x1) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f00000005c0)={0x3, 0x0, 0x49, &(0x7f0000000a00)=""/73}) shutdown(r5, 0x1) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/48, 0x1b}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/124, 0x79}, {&(0x7f0000000400)=""/168, 0xb7}], 0x6, 0x0, 0x0, 0xb7}, 0x40000110) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000900)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x1, 0x2, 0x2, 0x1, 0x1, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8000}, @func, @exit, @alu={0x7, 0x0, 0x1, 0x3, 0x1, 0x80, 0xffffffffffffffff}, @map_fd={0x18, 0x3}], &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0xf3, 0x4}, 0x10, 0x0, r4}, 0x80) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x13, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000001700), 0xffffff1f, r7}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f00000009c0), 0x220c41, 0x0) pipe2$watch_queue(&(0x7f0000000800), 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB="189630a7a2d80243eb5065d288b295451af0ff00000000"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x8}, 0x10, 0x0, r6}, 0x80) 18:09:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$cont(0x9, r2, 0x0, 0x0) 18:09:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8, 0x7, 0x4, 0x1}]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2900000054000100000000000000000007000000", @ANYRES32=0x0], 0x18}}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x169, 0x1e}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003540)={0xf, 0xd, &(0x7f0000001800)=ANY=[], &(0x7f0000000480)='GPL\x00', 0x0, 0xed, &(0x7f0000003240)=""/237, 0x41100, 0x14, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x9}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x0, 0x8c2}, 0x10, 0x0, r2}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a9}, [@call={0x85, 0x0, 0x0, 0x26}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x56}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000003c0)='GPL\x00', 0x8, 0x6d, &(0x7f0000000400)=""/109, 0x41100, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x10, 0xa, 0x8, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x26, &(0x7f0000000280)=""/38, 0x41000, 0x2, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000600)}, 0x80) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) socket(0x10, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) ioctl$int_in(r5, 0x5452, &(0x7f00000002c0)=0x1) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f00000005c0)={0x3, 0x0, 0x49, &(0x7f0000000a00)=""/73}) shutdown(r5, 0x1) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/48, 0x1b}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/124, 0x79}, {&(0x7f0000000400)=""/168, 0xb7}], 0x6, 0x0, 0x0, 0xb7}, 0x40000110) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0xc, &(0x7f0000000900)=@raw=[@cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x1, 0x2, 0x2, 0x1, 0x1, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8000}, @func, @exit, @alu={0x7, 0x0, 0x1, 0x3, 0x1, 0x80, 0xffffffffffffffff}, @map_fd={0x18, 0x3}], &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0xf3, 0x4}, 0x10, 0x0, r4}, 0x80) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x4, 0x13, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000001700), 0xffffff1f, r7}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f00000009c0), 0x220c41, 0x0) pipe2$watch_queue(&(0x7f0000000800), 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB="189630a7a2d80243eb5065d288b295451af0ff00000000"], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000002c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x0, 0x8}, 0x10, 0x0, r6}, 0x80) 18:09:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001140)={0x14, r1, 0x1}, 0x14}}, 0x0) 18:09:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x400000, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x38}]) 18:09:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0800000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r1, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "ec9700", 0x8, 0x11, 0x0, @private0, @mcast2, {[], @ndisc_ra}}}}, 0xfdef) 18:09:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001140)={0x14, r1, 0x1}, 0x14}}, 0x0) 18:09:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$cont(0x9, r2, 0x0, 0x0) 18:09:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001140)={0x14, r1, 0x1}, 0x14}}, 0x0) 18:09:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ac0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, 0x0}, 0x80) openat$zero(0xffffffffffffff9c, 0x0, 0x204403, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_ext={0x1c, 0xb, 0x0, 0x0, 0x1, 0x0, &(0x7f00000011c0), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x2}, 0x8, 0x10, &(0x7f0000001240)={0x4, 0x0, 0x6}, 0x10, 0x1aa7a, 0xffffffffffffffff, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 18:09:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001140)={0x14, r1, 0x1}, 0x14}}, 0x0) 18:09:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x1, 0x0, 0x0, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) 18:09:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x400000, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x38}]) [ 165.683753][ T26] audit: type=1400 audit(1691777368.476:1538): avc: denied { write } for pid=9330 comm="syz-executor.4" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 18:09:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$cont(0x9, r2, 0x0, 0x0) 18:09:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x400000, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x38}]) 18:09:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0800000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r1, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "ec9700", 0x8, 0x11, 0x0, @private0, @mcast2, {[], @ndisc_ra}}}}, 0xfdef) 18:09:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x1, 0x0, 0x0, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) 18:09:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ac0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, 0x0}, 0x80) openat$zero(0xffffffffffffff9c, 0x0, 0x204403, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_ext={0x1c, 0xb, 0x0, 0x0, 0x1, 0x0, &(0x7f00000011c0), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x2}, 0x8, 0x10, &(0x7f0000001240)={0x4, 0x0, 0x6}, 0x10, 0x1aa7a, 0xffffffffffffffff, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 18:09:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x1, 0x0, 0x0, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) 18:09:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$cont(0x9, r2, 0x0, 0x0) 18:09:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x1, 0x0, 0x0, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) 18:09:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ac0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, 0x0}, 0x80) openat$zero(0xffffffffffffff9c, 0x0, 0x204403, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_ext={0x1c, 0xb, 0x0, 0x0, 0x1, 0x0, &(0x7f00000011c0), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x2}, 0x8, 0x10, &(0x7f0000001240)={0x4, 0x0, 0x6}, 0x10, 0x1aa7a, 0xffffffffffffffff, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 18:09:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f00000000c0)={0x400000, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x38}]) 18:09:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0800000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r1, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "ec9700", 0x8, 0x11, 0x0, @private0, @mcast2, {[], @ndisc_ra}}}}, 0xfdef) 18:09:29 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ac0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, 0x0}, 0x80) openat$zero(0xffffffffffffff9c, 0x0, 0x204403, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_ext={0x1c, 0xb, 0x0, 0x0, 0x1, 0x0, &(0x7f00000011c0), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x2}, 0x8, 0x10, &(0x7f0000001240)={0x4, 0x0, 0x6}, 0x10, 0x1aa7a, 0xffffffffffffffff, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 18:09:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ac0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, 0x0}, 0x80) openat$zero(0xffffffffffffff9c, 0x0, 0x204403, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_ext={0x1c, 0xb, 0x0, 0x0, 0x1, 0x0, &(0x7f00000011c0), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x2}, 0x8, 0x10, &(0x7f0000001240)={0x4, 0x0, 0x6}, 0x10, 0x1aa7a, 0xffffffffffffffff, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 18:09:29 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ac0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, 0x0}, 0x80) openat$zero(0xffffffffffffff9c, 0x0, 0x204403, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_ext={0x1c, 0xb, 0x0, 0x0, 0x1, 0x0, &(0x7f00000011c0), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x2}, 0x8, 0x10, &(0x7f0000001240)={0x4, 0x0, 0x6}, 0x10, 0x1aa7a, 0xffffffffffffffff, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 18:09:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0800000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r1, &(0x7f0000000240)={@val={0x0, 0x86dd}, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "ec9700", 0x8, 0x11, 0x0, @private0, @mcast2, {[], @ndisc_ra}}}}, 0xfdef) 18:09:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r1, 0x7f58e4ee0ad6b4bb, 0x0, 0x0, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x3c}}, 0x0) 18:09:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x1, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x1, 0x0, @private1}, 0x1c) 18:09:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x1, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x1, 0x0, @private1}, 0x1c) [ 167.176821][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 18:09:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x1, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x1, 0x0, @private1}, 0x1c) 18:09:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r1, 0x7f58e4ee0ad6b4bb, 0x0, 0x0, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x3c}}, 0x0) 18:09:30 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ac0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, 0x0}, 0x80) openat$zero(0xffffffffffffff9c, 0x0, 0x204403, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_ext={0x1c, 0xb, 0x0, 0x0, 0x1, 0x0, &(0x7f00000011c0), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x2}, 0x8, 0x10, &(0x7f0000001240)={0x4, 0x0, 0x6}, 0x10, 0x1aa7a, 0xffffffffffffffff, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001780)={0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 18:09:30 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x1, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x1, 0x0, @private1}, 0x1c) 18:09:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) 18:09:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r1, 0xb01, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) [ 167.504555][ T9384] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 18:09:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x1, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x1, 0x0, @private1}, 0x1c) 18:09:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r1, 0x7f58e4ee0ad6b4bb, 0x0, 0x0, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x3c}}, 0x0) 18:09:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) 18:09:30 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x1, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x1, 0x0, @private1}, 0x1c) 18:09:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) 18:09:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r1, 0xb01, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 18:09:30 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x1, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x1, 0x0, @private1}, 0x1c) 18:09:30 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$GIO_SCRNMAP(r0, 0x5608, 0x0) 18:09:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r1, 0x7f58e4ee0ad6b4bb, 0x0, 0x0, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x3c}}, 0x0) 18:09:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) 18:09:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 167.740247][ T9410] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 18:09:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x460, 0xffffffff, 0x118, 0x450, 0x450, 0xffffffff, 0xffffffff, 0x550, 0x550, 0x550, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @dev, [], [], 'bond0\x00', 'pim6reg1\x00', {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@rand_addr=' \x01\x00', 'bond_slave_1\x00'}}}, {{@ipv6={@private0, @empty, [], [], 'ip6gretap0\x00', 'vlan0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:mnt_t:s0\x00'}}}, {{@ipv6={@remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'bridge0\x00', 'batadv0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c0) 18:09:30 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000300), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x5c, 0x0, 0xa, 0x0, 0x1ff}) 18:09:30 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$GIO_SCRNMAP(r0, 0x5608, 0x0) 18:09:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) 18:09:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r1, 0xb01, 0x0, 0x0, {0x7}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x5}]}]}, 0x20}}, 0x0) 18:09:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000180)=0x8) 18:09:30 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000300), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x5c, 0x0, 0xa, 0x0, 0x1ff}) 18:09:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x460, 0xffffffff, 0x118, 0x450, 0x450, 0xffffffff, 0xffffffff, 0x550, 0x550, 0x550, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @dev, [], [], 'bond0\x00', 'pim6reg1\x00', {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@rand_addr=' \x01\x00', 'bond_slave_1\x00'}}}, {{@ipv6={@private0, @empty, [], [], 'ip6gretap0\x00', 'vlan0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:mnt_t:s0\x00'}}}, {{@ipv6={@remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'bridge0\x00', 'batadv0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c0) 18:09:30 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$GIO_SCRNMAP(r0, 0x5608, 0x0) 18:09:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x27, 0x0, &(0x7f0000002a80)) 18:09:30 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000300), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000340)={0x0, 0x5c, 0x0, 0xa, 0x0, 0x1ff}) 18:09:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x27, 0x0, &(0x7f0000002a80)) 18:09:30 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\bb}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x10\n\x1f\t\'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x14\x80w\xd2|D\xaaK\x0f]x\xcbuH\xc2\xeec\xbf<>Y\x10\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q\x1dn\xb4\xb6s\xb0\f\xb4\x03\x02A\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5Y\x10\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q\x1dn\xb4\xb6s\xb0\f\xb4\x03\x02A\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5Y\x10\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q\x1dn\xb4\xb6s\xb0\f\xb4\x03\x02A\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) [ 168.051998][ T9452] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 18:09:30 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\bb}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x10\n\x1f\t\'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x14\x80w\xd2|D\xaaK\x0f]x\xcbuH\xc2\xeec\xbf<>Y\x10\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q\x1dn\xb4\xb6s\xb0\f\xb4\x03\x02A\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x2c}}, 0x0) 18:09:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x28, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 18:09:31 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\bb}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x10\n\x1f\t\'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x14\x80w\xd2|D\xaaK\x0f]x\xcbuH\xc2\xeec\xbf<>Y\x10\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q\x1dn\xb4\xb6s\xb0\f\xb4\x03\x02A\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x2c}}, 0x0) 18:09:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@allocspi={0xf8, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2}, @in6=@loopback}}}, 0xf8}}, 0x0) 18:09:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x28, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) [ 168.125251][ T9466] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.5'. 18:09:31 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\bb}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x10\n\x1f\t\'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x14\x80w\xd2|D\xaaK\x0f]x\xcbuH\xc2\xeec\xbf<>Y\x10\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q\x1dn\xb4\xb6s\xb0\f\xb4\x03\x02A\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x2c}}, 0x0) 18:09:31 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\bb}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x10\n\x1f\t\'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x14\x80w\xd2|D\xaaK\x0f]x\xcbuH\xc2\xeec\xbf<>Y\x10\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q\x1dn\xb4\xb6s\xb0\f\xb4\x03\x02A\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f00)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x4}}}]}, 0x48}}, 0x0) 18:09:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x2c}}, 0x0) 18:09:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:31 executing program 0: r0 = eventfd(0x0) r1 = timerfd_create(0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) creat(&(0x7f0000009a00)='./bus\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}}) 18:09:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) [ 168.561071][ T9498] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.5'. [ 168.577739][ T26] audit: type=1400 audit(1691777371.449:1539): avc: denied { read } for pid=9494 comm="syz-executor.0" name="uhid" dev="devtmpfs" ino=227 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 18:09:31 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f00)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x4}}}]}, 0x48}}, 0x0) 18:09:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=@allocspi={0xf8, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@mcast2}, @in6=@loopback}}}, 0xf8}}, 0x0) 18:09:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18390000010000000000000000000000850000006ee2ffff940000000000000018000000b92ba0527041982863a102000000000000008063000018590000070000000000000000000000bea906000000000000005162a87cf072743a0a93d59365add1aad3e381bffc2269c244a45b88e3ff61f92902d273b72a935a0646128c3c8db6774f1842a7b38a9ff6fc3c9d269f2d62a7227317d97de717633f6d91b25531d47a9f00df5a38f166218906bf7c69ffffb8abf4b419f1166b5e24a4e1b53149c0a609ac421ae1732d303c7ac30442dd4162632c8197a92ad070b7865b2f4965f5f7f1116598d61743e8059adccc1750fa98b36b3ae5d8f1aab2707836348b6fab52cb401a646e5f7507e8c0804c1e523437c36c4dfcdf4da104960842d02601800000000000004281f9ae20e8e592feed10a1a56be921b97d486522f3e0be1896ac9a1c69fb52e961db6b0d081ae8eab2114a90a8fb970057dc8712dbd4205800718cb7d0fd21630257a2d82069fc5627fd25da3860539db985afa600"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_HASH_SREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 18:09:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:31 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f00)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x4}}}]}, 0x48}}, 0x0) 18:09:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18390000010000000000000000000000850000006ee2ffff940000000000000018000000b92ba0527041982863a102000000000000008063000018590000070000000000000000000000bea906000000000000005162a87cf072743a0a93d59365add1aad3e381bffc2269c244a45b88e3ff61f92902d273b72a935a0646128c3c8db6774f1842a7b38a9ff6fc3c9d269f2d62a7227317d97de717633f6d91b25531d47a9f00df5a38f166218906bf7c69ffffb8abf4b419f1166b5e24a4e1b53149c0a609ac421ae1732d303c7ac30442dd4162632c8197a92ad070b7865b2f4965f5f7f1116598d61743e8059adccc1750fa98b36b3ae5d8f1aab2707836348b6fab52cb401a646e5f7507e8c0804c1e523437c36c4dfcdf4da104960842d02601800000000000004281f9ae20e8e592feed10a1a56be921b97d486522f3e0be1896ac9a1c69fb52e961db6b0d081ae8eab2114a90a8fb970057dc8712dbd4205800718cb7d0fd21630257a2d82069fc5627fd25da3860539db985afa600"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) [ 168.601290][ T26] audit: type=1400 audit(1691777371.449:1540): avc: denied { open } for pid=9494 comm="syz-executor.0" path="/dev/uhid" dev="devtmpfs" ino=227 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 168.632475][ T9505] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.5'. 18:09:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_HASH_SREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 18:09:31 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f00)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x4}}}]}, 0x48}}, 0x0) 18:09:32 executing program 0: r0 = eventfd(0x0) r1 = timerfd_create(0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) creat(&(0x7f0000009a00)='./bus\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}}) 18:09:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18390000010000000000000000000000850000006ee2ffff940000000000000018000000b92ba0527041982863a102000000000000008063000018590000070000000000000000000000bea906000000000000005162a87cf072743a0a93d59365add1aad3e381bffc2269c244a45b88e3ff61f92902d273b72a935a0646128c3c8db6774f1842a7b38a9ff6fc3c9d269f2d62a7227317d97de717633f6d91b25531d47a9f00df5a38f166218906bf7c69ffffb8abf4b419f1166b5e24a4e1b53149c0a609ac421ae1732d303c7ac30442dd4162632c8197a92ad070b7865b2f4965f5f7f1116598d61743e8059adccc1750fa98b36b3ae5d8f1aab2707836348b6fab52cb401a646e5f7507e8c0804c1e523437c36c4dfcdf4da104960842d02601800000000000004281f9ae20e8e592feed10a1a56be921b97d486522f3e0be1896ac9a1c69fb52e961db6b0d081ae8eab2114a90a8fb970057dc8712dbd4205800718cb7d0fd21630257a2d82069fc5627fd25da3860539db985afa600"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_HASH_SREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 18:09:32 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:32 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = socket$inet(0x2b, 0x801, 0x0) listen(r0, 0x0) 18:09:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:32 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 18:09:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:32 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = socket$inet(0x2b, 0x801, 0x0) listen(r0, 0x0) [ 169.432691][ T26] audit: type=1326 audit(1691777372.318:1541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 18:09:32 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = socket$inet(0x2b, 0x801, 0x0) listen(r0, 0x0) [ 169.473583][ T26] audit: type=1326 audit(1691777372.318:1542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 [ 169.497574][ T26] audit: type=1326 audit(1691777372.318:1543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 [ 169.521545][ T26] audit: type=1326 audit(1691777372.318:1544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=50 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 [ 169.545602][ T26] audit: type=1400 audit(1691777372.318:1545): avc: denied { listen } for pid=9536 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 169.565530][ T26] audit: type=1326 audit(1691777372.318:1546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 [ 169.589569][ T26] audit: type=1400 audit(1691777372.348:1547): avc: denied { shutdown } for pid=9526 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 169.610879][ T26] audit: type=1326 audit(1691777372.389:1548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9545 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 18:09:33 executing program 0: r0 = eventfd(0x0) r1 = timerfd_create(0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) creat(&(0x7f0000009a00)='./bus\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}}) 18:09:33 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 18:09:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0ebc, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x20, 0x1ff, 0x0, 0x74ec, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0xeee}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/396], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x20, 0x2, 0xfe, 0x39}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000a00)=r2) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0xc, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000500), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000580)=""/45, 0x2d}, {&(0x7f00000006c0)=""/66, 0x42}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x20) r5 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x5, 0x0, 0x7f, 0x2, 0x0, 0xffffffffffffffff, 0x12800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x7}, 0x10040, 0x8, 0x1, 0x0, 0x8e, 0x80000001, 0x9, 0x0, 0x0, 0x0, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r3], 0xfe2b) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'ip6erspan0\x00', 0x8000}) mkdirat$cgroup(r6, &(0x7f0000000600)='syz0\x00', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) r8 = gettid() r9 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x9, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x377a8250, 0x0, 0x0, 0xffefffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x7f, 0xfa, 0xff, 0x80, 0x0, 0x9, 0x60103, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x2, 0xdadc, 0x3, 0xeb6, 0x3, 0x0, 0x0, 0x7}, r8, 0xb, r9, 0x0) 18:09:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000100)=0x38e, 0x4) sendmmsg$inet(r1, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000440)='I', 0x1}], 0x1}}], 0x1, 0x0) 18:09:33 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = socket$inet(0x2b, 0x801, 0x0) listen(r0, 0x0) 18:09:33 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:33 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 18:09:33 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:33 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000100)=0x38e, 0x4) sendmmsg$inet(r1, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000440)='I', 0x1}], 0x1}}], 0x1, 0x0) 18:09:33 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 18:09:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000100)=0x38e, 0x4) sendmmsg$inet(r1, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000440)='I', 0x1}], 0x1}}], 0x1, 0x0) 18:09:34 executing program 0: r0 = eventfd(0x0) r1 = timerfd_create(0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) creat(&(0x7f0000009a00)='./bus\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}}) 18:09:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000100)=0x38e, 0x4) sendmmsg$inet(r1, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000440)='I', 0x1}], 0x1}}], 0x1, 0x0) 18:09:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000100)=0x38e, 0x4) sendmmsg$inet(r1, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000440)='I', 0x1}], 0x1}}], 0x1, 0x0) 18:09:34 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:34 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:34 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000100)=0x38e, 0x4) sendmmsg$inet(r1, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000440)='I', 0x1}], 0x1}}], 0x1, 0x0) 18:09:34 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000100)=0x38e, 0x4) sendmmsg$inet(r1, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000440)='I', 0x1}], 0x1}}], 0x1, 0x0) 18:09:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x68}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)=""/156, 0x9c}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000009240)={&(0x7f0000000500)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xa}, {}, {0xc}}, [@filter_kind_options=@f_fw={{0x7}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8}]}}]}, 0x38}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 18:09:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x68}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)=""/156, 0x9c}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000009240)={&(0x7f0000000500)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xa}, {}, {0xc}}, [@filter_kind_options=@f_fw={{0x7}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8}]}}]}, 0x38}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 18:09:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x68}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)=""/156, 0x9c}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000009240)={&(0x7f0000000500)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xa}, {}, {0xc}}, [@filter_kind_options=@f_fw={{0x7}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8}]}}]}, 0x38}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 171.167629][ T9596] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 171.198726][ T9601] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 171.230024][ T9603] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0, 0x68}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)=""/156, 0x9c}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000009240)={&(0x7f0000000500)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xa}, {}, {0xc}}, [@filter_kind_options=@f_fw={{0x7}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8}]}}]}, 0x38}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 18:09:34 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:34 executing program 0: symlink(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000140)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 18:09:34 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:34 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:34 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:34 executing program 0: symlink(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000140)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 18:09:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@private, @in=@empty}, {@in=@multicast1, 0x0, 0x6c}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x67}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) [ 171.928321][ T9605] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:34 executing program 0: symlink(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000140)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 18:09:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@private, @in=@empty}, {@in=@multicast1, 0x0, 0x6c}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x67}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 18:09:34 executing program 0: symlink(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000140)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 18:09:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@private, @in=@empty}, {@in=@multicast1, 0x0, 0x6c}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x67}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 18:09:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f00000001c0)=ANY=[@ANYRES8=0x0, @ANYRESHEX, @ANYRESHEX, @ANYRESOCT, @ANYRESHEX], 0x1, 0x7c4, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc2, 0x0, &(0x7f00000000c0)) 18:09:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f00000001c0)=ANY=[@ANYRES8=0x0, @ANYRESHEX, @ANYRESHEX, @ANYRESOCT, @ANYRESHEX], 0x1, 0x7c4, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc2, 0x0, &(0x7f00000000c0)) 18:09:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@private, @in=@empty}, {@in=@multicast1, 0x0, 0x6c}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x67}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 18:09:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x80041284, r0) 18:09:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:35 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:09:35 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$bt_hci(r0, 0x11c, 0x4, 0x0, &(0x7f0000000000)=0x28) 18:09:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x2f, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1, 0x0, 0x0, 0x6c06}, 0x4) 18:09:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f00000001c0)=ANY=[@ANYRES8=0x0, @ANYRESHEX, @ANYRESHEX, @ANYRESOCT, @ANYRESHEX], 0x1, 0x7c4, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc2, 0x0, &(0x7f00000000c0)) 18:09:35 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$bt_hci(r0, 0x11c, 0x4, 0x0, &(0x7f0000000000)=0x28) 18:09:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x2f, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1, 0x0, 0x0, 0x6c06}, 0x4) 18:09:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:35 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$bt_hci(r0, 0x11c, 0x4, 0x0, &(0x7f0000000000)=0x28) [ 172.828449][ T9641] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 172.864350][ T9641] veth9: entered promiscuous mode [ 172.869615][ T9641] veth9: entered allmulticast mode 18:09:35 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$bt_hci(r0, 0x11c, 0x4, 0x0, &(0x7f0000000000)=0x28) 18:09:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 172.938729][ T9665] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 172.957514][ T9665] veth11: entered promiscuous mode [ 172.962846][ T9665] veth11: entered allmulticast mode 18:09:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:36 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x2f, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1, 0x0, 0x0, 0x6c06}, 0x4) 18:09:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f00000001c0)=ANY=[@ANYRES8=0x0, @ANYRESHEX, @ANYRESHEX, @ANYRESOCT, @ANYRESHEX], 0x1, 0x7c4, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc2, 0x0, &(0x7f00000000c0)) 18:09:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1e, 0x10, &(0x7f0000000340)}, 0x42) 18:09:36 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x2f, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1, 0x0, 0x0, 0x6c06}, 0x4) [ 173.682554][ T9679] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 173.716664][ T9679] veth13: entered promiscuous mode [ 173.721925][ T9679] veth13: entered allmulticast mode 18:09:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1e, 0x10, &(0x7f0000000340)}, 0x42) 18:09:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x85, 0xcf, &(0x7f0000000000)="fae68670fef1c45ff0634fe72a6253b4357c978887379648e34b8e43761f35000437ab851cde4821ce97abc68f6a1c3593e2a7a267f78fff0e9e1743899a7dc5c1d2ecae353bd4bcdb61c053b1d7b1223331d664596d93a54d408700062455bf71027a99387a4c190aa0098e4554990bc6fdfd4647aad6ed8951ff86c092399a8d11b76c5e", &(0x7f00000008c0)=""/206, 0x0, 0x0, 0x4c, 0x1e, 0xfffffffffffffffe, &(0x7f00000000c0)="d5231f25b5f85be12036902ce1a29123e3c1d41aa6d9c06ff230c473bf3c", 0x0, 0x8000}, 0x48) 18:09:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 173.734391][ T9672] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 173.763173][ T9672] veth11: entered promiscuous mode [ 173.768641][ T9672] veth11: entered allmulticast mode 18:09:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1e, 0x10, &(0x7f0000000340)}, 0x42) 18:09:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x85, 0xcf, &(0x7f0000000000)="fae68670fef1c45ff0634fe72a6253b4357c978887379648e34b8e43761f35000437ab851cde4821ce97abc68f6a1c3593e2a7a267f78fff0e9e1743899a7dc5c1d2ecae353bd4bcdb61c053b1d7b1223331d664596d93a54d408700062455bf71027a99387a4c190aa0098e4554990bc6fdfd4647aad6ed8951ff86c092399a8d11b76c5e", &(0x7f00000008c0)=""/206, 0x0, 0x0, 0x4c, 0x1e, 0xfffffffffffffffe, &(0x7f00000000c0)="d5231f25b5f85be12036902ce1a29123e3c1d41aa6d9c06ff230c473bf3c", 0x0, 0x8000}, 0x48) 18:09:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1e, 0x10, &(0x7f0000000340)}, 0x42) 18:09:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 18:09:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x85, 0xcf, &(0x7f0000000000)="fae68670fef1c45ff0634fe72a6253b4357c978887379648e34b8e43761f35000437ab851cde4821ce97abc68f6a1c3593e2a7a267f78fff0e9e1743899a7dc5c1d2ecae353bd4bcdb61c053b1d7b1223331d664596d93a54d408700062455bf71027a99387a4c190aa0098e4554990bc6fdfd4647aad6ed8951ff86c092399a8d11b76c5e", &(0x7f00000008c0)=""/206, 0x0, 0x0, 0x4c, 0x1e, 0xfffffffffffffffe, &(0x7f00000000c0)="d5231f25b5f85be12036902ce1a29123e3c1d41aa6d9c06ff230c473bf3c", 0x0, 0x8000}, 0x48) [ 173.780149][ T9687] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 173.798988][ T9693] mmap: syz-executor.4 (9693) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 173.816140][ T9687] veth17: entered promiscuous mode [ 173.821398][ T9687] veth17: entered allmulticast mode 18:09:36 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 18:09:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x85, 0xcf, &(0x7f0000000000)="fae68670fef1c45ff0634fe72a6253b4357c978887379648e34b8e43761f35000437ab851cde4821ce97abc68f6a1c3593e2a7a267f78fff0e9e1743899a7dc5c1d2ecae353bd4bcdb61c053b1d7b1223331d664596d93a54d408700062455bf71027a99387a4c190aa0098e4554990bc6fdfd4647aad6ed8951ff86c092399a8d11b76c5e", &(0x7f00000008c0)=""/206, 0x0, 0x0, 0x4c, 0x1e, 0xfffffffffffffffe, &(0x7f00000000c0)="d5231f25b5f85be12036902ce1a29123e3c1d41aa6d9c06ff230c473bf3c", 0x0, 0x8000}, 0x48) 18:09:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 18:09:36 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 173.870198][ T9703] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 173.909088][ T9703] veth15: entered promiscuous mode [ 173.914300][ T9703] veth15: entered allmulticast mode 18:09:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 18:09:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x7, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 173.930511][ T9704] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 173.956934][ T9704] veth13: entered promiscuous mode [ 173.962178][ T9704] veth13: entered allmulticast mode 18:09:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:36 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 18:09:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400000024000b0f00ff00bf4298bde2880a0000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100677265640000000014000200100003000a"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000900)=@newqdisc={0x2c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6}]}, 0x2c}}, 0x0) 18:09:37 executing program 1: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000040)=ANY=[], 0x1, 0x4f7, &(0x7f0000000a40)="$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") fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) 18:09:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="7f17192100000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}}, 0x0) 18:09:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x7, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) [ 173.974272][ T9719] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 173.989203][ T9719] veth19: entered promiscuous mode [ 173.994390][ T9719] veth19: entered allmulticast mode 18:09:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x7, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 18:09:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000000), 0x10) getsockname$llc(r0, 0x0, &(0x7f00000014c0)) 18:09:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x7, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 18:09:37 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}}}}, 0x0) [ 174.033387][ T9727] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 174.067761][ T9734] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:09:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000000), 0x10) getsockname$llc(r0, 0x0, &(0x7f00000014c0)) 18:09:37 executing program 0: r0 = socket$inet6(0xa, 0x200000000003, 0x87) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaeaaaaaa0086dd6000000000082b0000000000000000000000000000000000fe8000000000000000000000000000aa87"], 0x0) [ 174.079688][ T26] kauditd_printk_skb: 19 callbacks suppressed [ 174.079704][ T26] audit: type=1400 audit(1691777377.054:1568): avc: denied { create } for pid=9738 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 174.107419][ T9734] veth21: entered promiscuous mode [ 174.112767][ T9734] veth21: entered allmulticast mode 18:09:37 executing program 4: r0 = socket$inet6(0xa, 0x200000000003, 0x87) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaeaaaaaa0086dd6000000000082b0000000000000000000000000000000000fe8000000000000000000000000000aa87"], 0x0) 18:09:37 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}}}}, 0x0) 18:09:37 executing program 0: r0 = socket$inet6(0xa, 0x200000000003, 0x87) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaeaaaaaa0086dd6000000000082b0000000000000000000000000000000000fe8000000000000000000000000000aa87"], 0x0) 18:09:37 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x5244, 0x4) 18:09:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000000), 0x10) getsockname$llc(r0, 0x0, &(0x7f00000014c0)) 18:09:37 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}}}}, 0x0) [ 174.120742][ T26] audit: type=1400 audit(1691777377.084:1569): avc: denied { bind } for pid=9738 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 174.142538][ T9737] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 174.158909][ T9737] veth15: entered promiscuous mode [ 174.164074][ T9737] veth15: entered allmulticast mode 18:09:37 executing program 0: r0 = socket$inet6(0xa, 0x200000000003, 0x87) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaeaaaaaa0086dd6000000000082b0000000000000000000000000000000000fe8000000000000000000000000000aa87"], 0x0) 18:09:37 executing program 4: r0 = socket$inet6(0xa, 0x200000000003, 0x87) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaeaaaaaa0086dd6000000000082b0000000000000000000000000000000000fe8000000000000000000000000000aa87"], 0x0) 18:09:37 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)={{}, {}, 0x0, 0x2}) 18:09:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000000), 0x10) getsockname$llc(r0, 0x0, &(0x7f00000014c0)) 18:09:37 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x5244, 0x4) 18:09:37 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}}}}, 0x0) 18:09:37 executing program 0: r0 = socket$inet6(0xa, 0x200000000003, 0x87) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaeaaaaaa0086dd6000000000082b0000000000000000000000000000000000fe8000000000000000000000000000aa87"], 0x0) 18:09:37 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)={{}, {}, 0x0, 0x2}) 18:09:37 executing program 4: r0 = socket$inet6(0xa, 0x200000000003, 0x87) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaeaaaaaa0086dd6000000000082b0000000000000000000000000000000000fe8000000000000000000000000000aa87"], 0x0) 18:09:37 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x5244, 0x4) 18:09:37 executing program 5: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)=ANY=[@ANYBLOB="0201130010061f00cb2f4359b648d5f10000002f0000ac14140eef06e63a808a8972bd0f72e410820c520f0604e4fdfe4b8894305af7b96b4c119510da9fe3c06376c33076a167d50261a67ad29b308cde521aa0c385c73fed0c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 18:09:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x5c, 0x30, 0x1, 0x0, 0x0, {}, [{0x48, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x0, 0x0, 0x10000000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x5c}}, 0x0) 18:09:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x8864}, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "ec9700", 0x10, 0x3a, 0x0, @local, @mcast2, {[], @ndisc_ra}}}}, 0x46) 18:09:37 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)={{}, {}, 0x0, 0x2}) 18:09:37 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x5244, 0x4) 18:09:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001900010026bd700000000000fc010000000000000000000000000000ac140800000000000000000000000000000000000000000002001020"], 0xb8}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00'}) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="8801000014"], 0x188}}, 0x0) 18:09:37 executing program 5: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)=ANY=[@ANYBLOB="0201130010061f00cb2f4359b648d5f10000002f0000ac14140eef06e63a808a8972bd0f72e410820c520f0604e4fdfe4b8894305af7b96b4c119510da9fe3c06376c33076a167d50261a67ad29b308cde521aa0c385c73fed0c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 18:09:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x5c, 0x30, 0x1, 0x0, 0x0, {}, [{0x48, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x0, 0x0, 0x10000000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x5c}}, 0x0) 18:09:37 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)={{}, {}, 0x0, 0x2}) 18:09:37 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc2001}]}) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000001440)=""/17, 0x11) 18:09:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001900010026bd700000000000fc010000000000000000000000000000ac140800000000000000000000000000000000000000000002001020"], 0xb8}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00'}) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="8801000014"], 0x188}}, 0x0) 18:09:37 executing program 5: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)=ANY=[@ANYBLOB="0201130010061f00cb2f4359b648d5f10000002f0000ac14140eef06e63a808a8972bd0f72e410820c520f0604e4fdfe4b8894305af7b96b4c119510da9fe3c06376c33076a167d50261a67ad29b308cde521aa0c385c73fed0c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 18:09:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x5c, 0x30, 0x1, 0x0, 0x0, {}, [{0x48, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x0, 0x0, 0x10000000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x5c}}, 0x0) 18:09:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) 18:09:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x8864}, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "ec9700", 0x10, 0x3a, 0x0, @local, @mcast2, {[], @ndisc_ra}}}}, 0x46) [ 174.367603][ T9793] netlink: 312 bytes leftover after parsing attributes in process `syz-executor.4'. 18:09:37 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc2001}]}) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000001440)=""/17, 0x11) 18:09:37 executing program 5: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)=ANY=[@ANYBLOB="0201130010061f00cb2f4359b648d5f10000002f0000ac14140eef06e63a808a8972bd0f72e410820c520f0604e4fdfe4b8894305af7b96b4c119510da9fe3c06376c33076a167d50261a67ad29b308cde521aa0c385c73fed0c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 18:09:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001900010026bd700000000000fc010000000000000000000000000000ac140800000000000000000000000000000000000000000002001020"], 0xb8}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00'}) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="8801000014"], 0x188}}, 0x0) 18:09:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) 18:09:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x5c, 0x30, 0x1, 0x0, 0x0, {}, [{0x48, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x0, 0x0, 0x10000000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x5c}}, 0x0) [ 174.424307][ T26] audit: type=1326 audit(1691777377.409:1570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9806 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 18:09:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001900010026bd700000000000fc010000000000000000000000000000ac140800000000000000000000000000000000000000000002001020"], 0xb8}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00'}) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="8801000014"], 0x188}}, 0x0) [ 174.510518][ T26] audit: type=1326 audit(1691777377.409:1571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9806 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 [ 174.534593][ T26] audit: type=1326 audit(1691777377.409:1572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9806 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 18:09:37 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc2001}]}) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000001440)=""/17, 0x11) 18:09:37 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) 18:09:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) [ 174.559454][ T26] audit: type=1326 audit(1691777377.409:1573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9806 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=267 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 [ 174.583434][ T26] audit: type=1326 audit(1691777377.409:1574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9806 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 18:09:37 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc2001}]}) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000001440)=""/17, 0x11) [ 174.608391][ T26] audit: type=1326 audit(1691777377.480:1575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9813 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 [ 174.632874][ T26] audit: type=1326 audit(1691777377.480:1576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9813 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 18:09:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc2001}]}) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000001440)=""/17, 0x11) 18:09:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x8864}, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "ec9700", 0x10, 0x3a, 0x0, @local, @mcast2, {[], @ndisc_ra}}}}, 0x46) [ 174.657042][ T26] audit: type=1326 audit(1691777377.480:1577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9813 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e41c94ae9 code=0x7ffc0000 18:09:37 executing program 2: set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x46e}, 0x8) sendto$inet6(r0, &(0x7f0000000080)="03", 0x34000, 0x0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 18:09:37 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) 18:09:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) 18:09:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc2001}]}) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000001440)=""/17, 0x11) 18:09:37 executing program 2: set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x46e}, 0x8) sendto$inet6(r0, &(0x7f0000000080)="03", 0x34000, 0x0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 18:09:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) 18:09:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc2001}]}) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000001440)=""/17, 0x11) 18:09:37 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) 18:09:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) 18:09:37 executing program 2: set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x46e}, 0x8) sendto$inet6(r0, &(0x7f0000000080)="03", 0x34000, 0x0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 18:09:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) recvmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000000)=""/140, 0x8c}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f0000001880)=""/253, 0xfd}, {&(0x7f0000000840)=""/4126, 0x101e}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000380)=""/155, 0x9b}], 0x7}, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x300, 0x2, 0x0) 18:09:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x8864}, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "ec9700", 0x10, 0x3a, 0x0, @local, @mcast2, {[], @ndisc_ra}}}}, 0x46) 18:09:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x0, 0x0, @multicast2, @empty}}}}) 18:09:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x0, 0x0, @multicast2, @empty}}}}) 18:09:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES16], 0x1, 0x4f4, &(0x7f0000000540)="$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") write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='oom_adj\x00') syz_io_uring_setup(0x0, &(0x7f0000000740), &(0x7f0000002000), &(0x7f0000400000)) 18:09:37 executing program 2: set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x46e}, 0x8) sendto$inet6(r0, &(0x7f0000000080)="03", 0x34000, 0x0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 18:09:37 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) 18:09:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @fwd={0x6}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000480)=""/239, 0x44, 0xef, 0x1}, 0x20) 18:09:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x0, 0x0, @multicast2, @empty}}}}) 18:09:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES16], 0x1, 0x4f4, &(0x7f0000000540)="$eJzs3V9rHGsZAPBnNtljeppjctSL44FzPHiOpEW7mzS2DV60FcS7glLva0g2IWSTDdlN24QiKX4AQUQLXnnljeAHEKQfQQoFvRcVRbTVCy/UkZmdtMmy26SY3S2b3w/enXdmd+Z53t3s7Px5MxPAmfVRRNyMiLGIuBgRU8X0UlFiv12y1z1/9mApK0mk6e2/JZEU0yKvHTxGnC9mm2gPumru7q0v1uu17WK82trYqjZ39y6tbSyu1lZrm/Pzc1cXri1cWZg9lXZm7br+jT/9+Ac//+b1X3/l3u/v/OXC97J8J4vn2+04fe33pJy9Fy+MR8R2P4INwVjRnvKwEwEA4ESy7bfPRMQX8+3/qRjLt+ZyNukAAABgRKQ3JuPfSUQKAAAAjKwbeR/YpFQp+vtORqlUqbT78H4u3i7VG83Wl1caO5vL7b6y01EurazVa7NFn9rpKCfZ+Fxefzl+uWN8PiLejYgfTZ3LxytLjfrysA9+AAAAwBlxvmP//59T7f1/AAAAYMRMDzsBAAAAoO967f8nA84DAAAA6B/n/wEAAGCkfevWraykB/e/Xr67u7PeuHtpudZcr2zsLFWWGttbldVGYzW/Zt/GccurNxpbX43NnfvVVq3ZqjZ39+5sNHY2W3fWjtwCGwAAABigd7/w+HdJROx/7VxeMm9lD2M9ZtBXAEZG6XVe/Mf+5QEMXq+feWD0jQ87AWB49oedADBsRy710WWj4HDnnSPHDH7Tv5wAAIDTNfP57uf/s12A8rCTA/rqtc7/AyPF+X84u17z/P+TfuUBDF7ZFgCcecfd6qPnxTtOfP4/TY9dFgAA0FeTeUlKleJc4GSUSpVKxDv5v/qXk5W1em02Ij4dEb+dKn8qG5/L50zcHhAAAAAAAAAAAAAAAAAAAAAAAAAATihNk0gBAACAkRZR+nNS3P9rZuqTyc7jA28l/5rKhxFx76e3f3J/sdXansum//3F9NajYvrlYRzBAAAAADod7Kcf7McDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwGl6/uzB0kEZZNy/fj0iprvFH4+JfDgR5Yh4+x9JjB+aL4mIsVOIv/8wIt7rFj/J0orpIovO+KWIODeY+B+kado1/vlTiA9n2eNs/XOz2/evFB/lw+7f//Gi/L96r/9KL9Z/Yz3Wf++cMMb7T39Z7Rn/YcT7493XPwfxkx7xP+62wC5vyne/s7fXK376s4iZrr8/yZFY1dbGVrW5u3dpbWNxtbZa25yfn7u6cG3hysJsdWWtXiseu8b44Qe/+m/HpP+kbXn7o0f86WPa/0lWKR9uTGeYItjT+88+266WOxaRx7/wcffP/71XxM/+Jr5U/A5kz88c1Pfb9cM+/MWTD7smVsRf7tH+4z7/C70W2uHit7//hxO+FAAYgObu3vpivV7b7nvlUZqmg4ql8gZWJt6MNFSOr5zGkS0AAOBN83Kjf9iZAAAAAAAAAAAAAAAAAAAAwNnV3I1Svy8n1hlzfzhNBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4pf8FAAD//0KX4lI=") write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='oom_adj\x00') syz_io_uring_setup(0x0, &(0x7f0000000740), &(0x7f0000002000), &(0x7f0000400000)) 18:09:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @fwd={0x6}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000480)=""/239, 0x44, 0xef, 0x1}, 0x20) [ 174.956523][ T9876] tmpfs: Bad value for 'mpol' 18:09:37 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) 18:09:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x0, 0x0, @multicast2, @empty}}}}) 18:09:38 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) 18:09:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES16], 0x1, 0x4f4, &(0x7f0000000540)="$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") write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='oom_adj\x00') syz_io_uring_setup(0x0, &(0x7f0000000740), &(0x7f0000002000), &(0x7f0000400000)) 18:09:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @fwd={0x6}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000480)=""/239, 0x44, 0xef, 0x1}, 0x20) 18:09:38 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000000)=@ethtool_rxfh={0x34, 0x0, 0x0, 0x0, 0x0, "91ac8e"}}) 18:09:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x46, 0xf0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x2e, 0x61, 0x30, 0x40, 0x61, 0x30, 0x5f, 0x0, 0x30]}}, &(0x7f0000000100)=""/105, 0x2f, 0x69}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x7ff, 0x28}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x80, 0x10}, @jmp={0x5, 0x0, 0x9, 0xd2b5e1f43f330ef, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xb, 0x8}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x99fd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000005c0)={0x0, &(0x7f00000003c0)=""/32, &(0x7f0000000400), &(0x7f0000000500), 0x1, r2}, 0x38) 18:09:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7c4, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$inet_int(r1, 0x10d, 0xc, 0x0, &(0x7f00000000c0)) 18:09:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x46, 0xf0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x2e, 0x61, 0x30, 0x40, 0x61, 0x30, 0x5f, 0x0, 0x30]}}, &(0x7f0000000100)=""/105, 0x2f, 0x69}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x7ff, 0x28}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x80, 0x10}, @jmp={0x5, 0x0, 0x9, 0xd2b5e1f43f330ef, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xb, 0x8}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x99fd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000005c0)={0x0, &(0x7f00000003c0)=""/32, &(0x7f0000000400), &(0x7f0000000500), 0x1, r2}, 0x38) 18:09:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @fwd={0x6}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000480)=""/239, 0x44, 0xef, 0x1}, 0x20) 18:09:38 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) [ 175.045915][ T9891] tmpfs: Bad value for 'mpol' 18:09:38 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000000)=@ethtool_rxfh={0x34, 0x0, 0x0, 0x0, 0x0, "91ac8e"}}) 18:09:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x21000e, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES16], 0x1, 0x4f4, &(0x7f0000000540)="$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") write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='oom_adj\x00') syz_io_uring_setup(0x0, &(0x7f0000000740), &(0x7f0000002000), &(0x7f0000400000)) 18:09:38 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000000)=@ethtool_rxfh={0x34, 0x0, 0x0, 0x0, 0x0, "91ac8e"}}) 18:09:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7c4, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$inet_int(r1, 0x10d, 0xc, 0x0, &(0x7f00000000c0)) 18:09:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x46, 0xf0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x2e, 0x61, 0x30, 0x40, 0x61, 0x30, 0x5f, 0x0, 0x30]}}, &(0x7f0000000100)=""/105, 0x2f, 0x69}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x7ff, 0x28}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x80, 0x10}, @jmp={0x5, 0x0, 0x9, 0xd2b5e1f43f330ef, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xb, 0x8}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x99fd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000005c0)={0x0, &(0x7f00000003c0)=""/32, &(0x7f0000000400), &(0x7f0000000500), 0x1, r2}, 0x38) 18:09:38 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) 18:09:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x46, 0xf0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x2e, 0x61, 0x30, 0x40, 0x61, 0x30, 0x5f, 0x0, 0x30]}}, &(0x7f0000000100)=""/105, 0x2f, 0x69}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x7ff, 0x28}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x80, 0x10}, @jmp={0x5, 0x0, 0x9, 0xd2b5e1f43f330ef, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xb, 0x8}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x99fd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000005c0)={0x0, &(0x7f00000003c0)=""/32, &(0x7f0000000400), &(0x7f0000000500), 0x1, r2}, 0x38) [ 175.121959][ T9909] tmpfs: Bad value for 'mpol' 18:09:38 executing program 5: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = syz_open_procfs(0x0, &(0x7f0000000200)='mountinfo\x00') r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000001b0000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mount$9p_fd(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000002480)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 18:09:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x46, 0xf0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x2e, 0x61, 0x30, 0x40, 0x61, 0x30, 0x5f, 0x0, 0x30]}}, &(0x7f0000000100)=""/105, 0x2f, 0x69}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x7ff, 0x28}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x80, 0x10}, @jmp={0x5, 0x0, 0x9, 0xd2b5e1f43f330ef, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xb, 0x8}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x99fd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000005c0)={0x0, &(0x7f00000003c0)=""/32, &(0x7f0000000400), &(0x7f0000000500), 0x1, r2}, 0x38) 18:09:38 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f0000000000)=@ethtool_rxfh={0x34, 0x0, 0x0, 0x0, 0x0, "91ac8e"}}) 18:09:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x46, 0xf0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x2e, 0x61, 0x30, 0x40, 0x61, 0x30, 0x5f, 0x0, 0x30]}}, &(0x7f0000000100)=""/105, 0x2f, 0x69}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x7ff, 0x28}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x80, 0x10}, @jmp={0x5, 0x0, 0x9, 0xd2b5e1f43f330ef, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xb, 0x8}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x99fd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000005c0)={0x0, &(0x7f00000003c0)=""/32, &(0x7f0000000400), &(0x7f0000000500), 0x1, r2}, 0x38) [ 175.165968][ T9919] tmpfs: Bad value for 'mpol' 18:09:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x0, @empty}}) 18:09:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="ae4a00000000e14ce300000000975476cb57c80100bf7e5eff11033143c800"/40, 0x28}], 0x1}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="39ed46976c3b2c7e70225b9ed48dd67f665e00ae58e47907afdf27b71b", 0x1d}, {&(0x7f0000000080)="9d6c175450968083591995", 0xb}], 0x2}}], 0x2, 0x0) 18:09:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x46, 0xf0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x2e, 0x61, 0x30, 0x40, 0x61, 0x30, 0x5f, 0x0, 0x30]}}, &(0x7f0000000100)=""/105, 0x2f, 0x69}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x7ff, 0x28}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x80, 0x10}, @jmp={0x5, 0x0, 0x9, 0xd2b5e1f43f330ef, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xb, 0x8}, 0x10}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x99fd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000005c0)={0x0, &(0x7f00000003c0)=""/32, &(0x7f0000000400), &(0x7f0000000500), 0x1, r2}, 0x38) 18:09:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7c4, &(0x7f0000000340)="$eJzs3c9rG1ceAPDvyFLsONm1FxZ2syfDwq4hRF4n3qSFHlJ6KIUEAu25iZEVk1q2giWH2Bja0BZ6KbSlh0J7ybk/0luv/XEqpP9FDyUhbZxQhx6Ky+iH7diSYyeKlcafD4z93swbvffVzLx5mhmkAPasofRPJuJQRLyXRAw05icRkaulshEn6+WWlxYL6ZTEysrLvyS1MneXFgv7162TOtDI/DMivn074nBmc72V+YWp8VKpONvIj1SnL45U5heOXJgenyxOFmeOj46NHT3x/xPHOxfrrz8sHLz5/ov//eLkb2/+49q73yVxMg42lqVxdK6muqEYarwnufQtvM8Lna6sy5Idln/9MbWDnUkPzZ76UR6HYiB6aikA4GmWjsNWAIA9JnH+B4A9pnkd4O7SYqE5rV4cONWtqxK759bzEdFXj795f7O+JNu4Z9dXuw/afze5785IEhGDHah/KCI++erVz9IpHtN9SIBW3rgSEecGhzb3/8mmZxZ26n/bKDO0Ia//g93zdTr+eabV+C+zOv6JFuOf3hbH7sN48PGfudGBatpKx3/PrXu2bXld/A2DPY3cX2pjvlxy/kKpmPZtf42I4cj1pvnRZum+zXUM3/n9Trv614//bn/w2qdp/en/tRKZG9ne+9eZGK+OP2rcTbeuRPwr2yr+Zv/fV/uQ0Gr8e2abdbz07Dsft1uWxp/Gm065xrw0vfb84eO1cjXiPy23/9oTbcmWzyeO1HaHkeZO0cKXP37U367+9ds/ndL6m58FdkO6/fu3jn8wWf+8ZmXndVy/OvBNu2VDq1ef28Xfev/fl7xSS+9rzLs8Xq3OjkbsS05tnn90bd1mvlk+jX/4362P/2b/l7TY/9N989w248/e/PnzDbNur8Xf/e0/saPtvzGRJG0XNRLXlqd62tW/Rfzfv1XfMW5ke8dqZYcb69T6vztbDxO3aE6pOLs/Hn5vBgAAAAAAAAAAAAAAAAAAAAAAAICdy0TEwUgy+dV0JpPP13/D++/RnymVK9XD58tzMxNR+63swchlml91ObDu+1BHG9+H38wf3ZA/FhF/i4gPe/fX8vlCuTTR7eABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoOFAm9//T/3Ue2+lrtutBAA6rq/bDQAAdp3zPwDsPc7/ALD3OP8DwN5zPdPtFgAAu+3hPv/3drwdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPLXOnD6dTiv3lhYLaX7i0vzcVPnSkYliZSo/PVfIF8qzF/OT5fJkqZgvlKcf9HqlcvniWMzMXR6pFivVkcr8wtnp8txM9eyF6fHJ4tlibleiAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAICdqcwvTI2XSsXZR09kIqLlomzn63rSEn3xRDRje4ljy/Xt0dFXznb6BZ/aRO7JaMaDEt3slQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD+PP4IAAD//60JMhc=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$inet_int(r1, 0x10d, 0xc, 0x0, &(0x7f00000000c0)) 18:09:38 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv4={0x800, @tipc={{0x7, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @remote, {[@rr={0x7, 0x3, 0xb2}, @noop, @rr={0x7, 0x3}]}}, @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}, 0x0) 18:09:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x0, @empty}}) 18:09:38 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 18:09:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="ae4a00000000e14ce300000000975476cb57c80100bf7e5eff11033143c800"/40, 0x28}], 0x1}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="39ed46976c3b2c7e70225b9ed48dd67f665e00ae58e47907afdf27b71b", 0x1d}, {&(0x7f0000000080)="9d6c175450968083591995", 0xb}], 0x2}}], 0x2, 0x0) 18:09:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x30]}}, 0x0, 0x36}, 0x20) 18:09:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="ae4a00000000e14ce300000000975476cb57c80100bf7e5eff11033143c800"/40, 0x28}], 0x1}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="39ed46976c3b2c7e70225b9ed48dd67f665e00ae58e47907afdf27b71b", 0x1d}, {&(0x7f0000000080)="9d6c175450968083591995", 0xb}], 0x2}}], 0x2, 0x0) 18:09:38 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv4={0x800, @tipc={{0x7, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @remote, {[@rr={0x7, 0x3, 0xb2}, @noop, @rr={0x7, 0x3}]}}, @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}, 0x0) 18:09:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x0, @empty}}) 18:09:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x0, @empty}}) 18:09:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7c4, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$inet_int(r1, 0x10d, 0xc, 0x0, &(0x7f00000000c0)) 18:09:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x30]}}, 0x0, 0x36}, 0x20) 18:09:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="ae4a00000000e14ce300000000975476cb57c80100bf7e5eff11033143c800"/40, 0x28}], 0x1}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="39ed46976c3b2c7e70225b9ed48dd67f665e00ae58e47907afdf27b71b", 0x1d}, {&(0x7f0000000080)="9d6c175450968083591995", 0xb}], 0x2}}], 0x2, 0x0) 18:09:38 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv4={0x800, @tipc={{0x7, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @remote, {[@rr={0x7, 0x3, 0xb2}, @noop, @rr={0x7, 0x3}]}}, @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}, 0x0) 18:09:38 executing program 4: unshare(0x8020400) r0 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x3f, 0x9}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x2}, 0x38) 18:09:39 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 18:09:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x30]}}, 0x0, 0x36}, 0x20) 18:09:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) close(r0) 18:09:39 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv4={0x800, @tipc={{0x7, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010100, @remote, {[@rr={0x7, 0x3, 0xb2}, @noop, @rr={0x7, 0x3}]}}, @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}, 0x0) 18:09:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='highspeed\x00', 0xa) 18:09:39 executing program 4: unshare(0x8020400) r0 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x3f, 0x9}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x2}, 0x38) 18:09:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='highspeed\x00', 0xa) 18:09:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x30]}}, 0x0, 0x36}, 0x20) 18:09:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) close(r0) 18:09:39 executing program 4: unshare(0x8020400) r0 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x3f, 0x9}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x2}, 0x38) 18:09:39 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) close(r0) 18:09:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) close(r0) 18:09:39 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) close(r0) 18:09:39 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 18:09:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='highspeed\x00', 0xa) 18:09:39 executing program 3: r0 = io_uring_setup(0x46d0, &(0x7f0000000180)) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2082) read(0xffffffffffffffff, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:09:39 executing program 4: unshare(0x8020400) r0 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x3f, 0x9}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x2}, 0x38) 18:09:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) close(r0) 18:09:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='highspeed\x00', 0xa) 18:09:40 executing program 3: r0 = io_uring_setup(0x46d0, &(0x7f0000000180)) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2082) read(0xffffffffffffffff, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:09:40 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) close(r0) 18:09:40 executing program 0: r0 = io_uring_setup(0x46d0, &(0x7f0000000180)) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2082) read(0xffffffffffffffff, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:09:40 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:40 executing program 3: r0 = io_uring_setup(0x46d0, &(0x7f0000000180)) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2082) read(0xffffffffffffffff, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:09:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x7a3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) close(r0) 18:09:40 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 18:09:40 executing program 2: futex(&(0x7f00000000c0)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x5, 0x0, 0x0, &(0x7f00000000c0)=0x1, 0x1) 18:09:40 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:40 executing program 0: r0 = io_uring_setup(0x46d0, &(0x7f0000000180)) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2082) read(0xffffffffffffffff, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:09:40 executing program 3: r0 = io_uring_setup(0x46d0, &(0x7f0000000180)) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2082) read(0xffffffffffffffff, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:09:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x7a3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) close(r0) 18:09:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x7a3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) close(r0) 18:09:40 executing program 0: r0 = io_uring_setup(0x46d0, &(0x7f0000000180)) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2082) read(0xffffffffffffffff, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:09:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x7a3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) close(r0) 18:09:40 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x7a3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) close(r0) 18:09:40 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x7a3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) close(r0) 18:09:41 executing program 2: futex(&(0x7f00000000c0)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x5, 0x0, 0x0, &(0x7f00000000c0)=0x1, 0x1) 18:09:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:41 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x0, 0xb, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x7a3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) close(r0) 18:09:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:41 executing program 4: r0 = syz_io_uring_setup(0x3f0a, &(0x7f0000000140), &(0x7f0000ffb000), &(0x7f0000e3b000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0xf, &(0x7f0000002780)={0xfff, 0x0, 0x0, 0x0, 0x2}, 0x20) 18:09:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x2f, 0x0, 0x0) recvmmsg(r0, &(0x7f00000003c0), 0x300, 0x0, 0x0) 18:09:41 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x0, 0xb, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="f1ff0000000000000a00000007000100667700002000020008000100000004"], 0x4c}}, 0x0) [ 178.780479][T10067] selinux_netlink_send: 20 callbacks suppressed [ 178.780497][T10067] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10067 comm=syz-executor.3 [ 178.815891][T10067] __nla_validate_parse: 3 callbacks suppressed [ 178.815906][T10067] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 178.836745][T10067] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:42 executing program 2: futex(&(0x7f00000000c0)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x5, 0x0, 0x0, &(0x7f00000000c0)=0x1, 0x1) 18:09:42 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0xc}, {0x6}]}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000340)={@empty, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "731b7a", 0x10, 0x6, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e83e8a", 0x0, "a86f84"}}}}}}}, 0x0) 18:09:42 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, &(0x7f0000000040), r0, 0x0, 0xfffffffffffff801, 0x0) 18:09:42 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x0, 0xb, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:42 executing program 4: r0 = syz_io_uring_setup(0x3f0a, &(0x7f0000000140), &(0x7f0000ffb000), &(0x7f0000e3b000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0xf, &(0x7f0000002780)={0xfff, 0x0, 0x0, 0x0, 0x2}, 0x20) 18:09:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="f1ff0000000000000a00000007000100667700002000020008000100000004"], 0x4c}}, 0x0) 18:09:42 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x0, 0xb, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:42 executing program 4: r0 = syz_io_uring_setup(0x3f0a, &(0x7f0000000140), &(0x7f0000ffb000), &(0x7f0000e3b000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0xf, &(0x7f0000002780)={0xfff, 0x0, 0x0, 0x0, 0x2}, 0x20) 18:09:42 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, &(0x7f0000000040), r0, 0x0, 0xfffffffffffff801, 0x0) 18:09:42 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0xc}, {0x6}]}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000340)={@empty, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "731b7a", 0x10, 0x6, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e83e8a", 0x0, "a86f84"}}}}}}}, 0x0) 18:09:42 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0xc}, {0x6}]}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000340)={@empty, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "731b7a", 0x10, 0x6, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e83e8a", 0x0, "a86f84"}}}}}}}, 0x0) 18:09:42 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, &(0x7f0000000040), r0, 0x0, 0xfffffffffffff801, 0x0) [ 179.577230][T10078] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10078 comm=syz-executor.3 [ 179.637336][T10078] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 179.656566][T10078] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:43 executing program 2: futex(&(0x7f00000000c0)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000040), 0x5, 0x0, 0x0, &(0x7f00000000c0)=0x1, 0x1) 18:09:43 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x1ff, 0x0) ioctl$USBDEVFS_WAIT_FOR_RESUME(r0, 0x5523) 18:09:43 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, &(0x7f0000000040), r0, 0x0, 0xfffffffffffff801, 0x0) 18:09:43 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0xc}, {0x6}]}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000340)={@empty, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "731b7a", 0x10, 0x6, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e83e8a", 0x0, "a86f84"}}}}}}}, 0x0) 18:09:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="f1ff0000000000000a00000007000100667700002000020008000100000004"], 0x4c}}, 0x0) 18:09:43 executing program 4: r0 = syz_io_uring_setup(0x3f0a, &(0x7f0000000140), &(0x7f0000ffb000), &(0x7f0000e3b000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0xf, &(0x7f0000002780)={0xfff, 0x0, 0x0, 0x0, 0x2}, 0x20) 18:09:43 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x1ff, 0x0) ioctl$USBDEVFS_WAIT_FOR_RESUME(r0, 0x5523) 18:09:43 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000000440)={0x18, 0x2, {0x2, @multicast2}}, 0x1e) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x2, @empty}}, 0x1e) 18:09:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@typedef={0x1, 0x0, 0x0, 0x8, 0x2}, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000000700)=""/129, 0x4b, 0x81, 0x1}, 0x20) 18:09:43 executing program 0: r0 = syz_io_uring_setup(0x432e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x88, 0x0, @fd_index}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 18:09:43 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x1ff, 0x0) ioctl$USBDEVFS_WAIT_FOR_RESUME(r0, 0x5523) [ 180.448379][T10103] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10103 comm=syz-executor.3 18:09:43 executing program 0: r0 = syz_io_uring_setup(0x432e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x88, 0x0, @fd_index}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) [ 180.496645][T10103] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 180.518746][ T26] kauditd_printk_skb: 35 callbacks suppressed [ 180.518800][ T26] audit: type=1400 audit(1691777383.577:1613): avc: denied { bind } for pid=10119 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 180.547352][T10103] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="f1ff0000000000000a00000007000100667700002000020008000100000004"], 0x4c}}, 0x0) 18:09:44 executing program 0: r0 = syz_io_uring_setup(0x432e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x88, 0x0, @fd_index}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 18:09:44 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x1ff, 0x0) ioctl$USBDEVFS_WAIT_FOR_RESUME(r0, 0x5523) 18:09:44 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000000440)={0x18, 0x2, {0x2, @multicast2}}, 0x1e) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x2, @empty}}, 0x1e) 18:09:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@typedef={0x1, 0x0, 0x0, 0x8, 0x2}, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000000700)=""/129, 0x4b, 0x81, 0x1}, 0x20) 18:09:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0)={@empty}, 0x20) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x3e, 0x105, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 18:09:44 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000000440)={0x18, 0x2, {0x2, @multicast2}}, 0x1e) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x2, @empty}}, 0x1e) 18:09:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@typedef={0x1, 0x0, 0x0, 0x8, 0x2}, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000000700)=""/129, 0x4b, 0x81, 0x1}, 0x20) 18:09:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f0000000140)={[{@jqfmt_vfsold}, {@resgid={'resgid', 0x3d, 0xee00}}, {@bh}, {@noload}, {@nombcache}, {@usrjquota}]}, 0xfe, 0x44c, &(0x7f0000001900)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f0b5e87"], 0xb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x12, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x7, 0x0, &(0x7f0000000000)) 18:09:44 executing program 0: r0 = syz_io_uring_setup(0x432e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x88, 0x0, @fd_index}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 18:09:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@typedef={0x1, 0x0, 0x0, 0x8, 0x2}, @func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000000700)=""/129, 0x4b, 0x81, 0x1}, 0x20) 18:09:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0)={@empty}, 0x20) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x3e, 0x105, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) [ 181.302495][T10131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10131 comm=syz-executor.3 [ 181.332377][T10131] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:44 executing program 0: r0 = eventfd(0x0) r1 = dup2(r0, r0) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="5500000065ffffff"], 0x15) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000007c0)="22ee0d26f2025a35", 0x8}], 0x1) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "6a85d1e89d5149808782cfd4945bb845faa65f1ce67d36250fb74afa5d6c4ef395e3224fefe8e7e57a210ae7400978035c24b6738ff2023d4b61550fd26a05e0e8a1dfc862fa960ba468d1e178534c644e413d4972cdca796c10e2e3c420e7a2bfd6788c24d1d4dbd9310a91"}, 0xc4) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 18:09:44 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000000440)={0x18, 0x2, {0x2, @multicast2}}, 0x1e) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x2, @empty}}, 0x1e) 18:09:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f0000000140)={[{@jqfmt_vfsold}, {@resgid={'resgid', 0x3d, 0xee00}}, {@bh}, {@noload}, {@nombcache}, {@usrjquota}]}, 0xfe, 0x44c, &(0x7f0000001900)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f0b5e87"], 0xb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x12, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x7, 0x0, &(0x7f0000000000)) 18:09:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000280)=@ipmr_delroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, 0x5}, [@RTA_DST={0x3, 0x2, @multicast1}]}, 0x24}}, 0x0) 18:09:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 18:09:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0)={@empty}, 0x20) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x3e, 0x105, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 18:09:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x1}], 0x1, 0x0, 0x0, 0xfffffffe) [ 181.369370][ T26] audit: type=1400 audit(1691777384.435:1614): avc: denied { getopt } for pid=10138 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 181.391983][T10131] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f0000000140)={[{@jqfmt_vfsold}, {@resgid={'resgid', 0x3d, 0xee00}}, {@bh}, {@noload}, {@nombcache}, {@usrjquota}]}, 0xfe, 0x44c, &(0x7f0000001900)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f0b5e87"], 0xb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x12, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x7, 0x0, &(0x7f0000000000)) 18:09:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 18:09:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000280)=@ipmr_delroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, 0x5}, [@RTA_DST={0x3, 0x2, @multicast1}]}, 0x24}}, 0x0) 18:09:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0)={@empty}, 0x20) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x3e, 0x105, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 18:09:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x1}], 0x1, 0x0, 0x0, 0xfffffffe) [ 181.448345][T10155] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 181.501980][T10167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 18:09:44 executing program 0: r0 = eventfd(0x0) r1 = dup2(r0, r0) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="5500000065ffffff"], 0x15) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000007c0)="22ee0d26f2025a35", 0x8}], 0x1) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "6a85d1e89d5149808782cfd4945bb845faa65f1ce67d36250fb74afa5d6c4ef395e3224fefe8e7e57a210ae7400978035c24b6738ff2023d4b61550fd26a05e0e8a1dfc862fa960ba468d1e178534c644e413d4972cdca796c10e2e3c420e7a2bfd6788c24d1d4dbd9310a91"}, 0xc4) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 18:09:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 18:09:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f0000000140)={[{@jqfmt_vfsold}, {@resgid={'resgid', 0x3d, 0xee00}}, {@bh}, {@noload}, {@nombcache}, {@usrjquota}]}, 0xfe, 0x44c, &(0x7f0000001900)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f0b5e87"], 0xb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x12, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x7, 0x0, &(0x7f0000000000)) 18:09:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000003c0)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_KEY(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000540)={0x1c, r3, 0xdc52d8c3739c760d, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x1c}}, 0x0) 18:09:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x1}], 0x1, 0x0, 0x0, 0xfffffffe) 18:09:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000280)=@ipmr_delroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, 0x5}, [@RTA_DST={0x3, 0x2, @multicast1}]}, 0x24}}, 0x0) 18:09:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 18:09:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x1}], 0x1, 0x0, 0x0, 0xfffffffe) 18:09:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000003c0)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_KEY(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000540)={0x1c, r3, 0xdc52d8c3739c760d, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x1c}}, 0x0) 18:09:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000280)=@ipmr_delroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, 0x5}, [@RTA_DST={0x3, 0x2, @multicast1}]}, 0x24}}, 0x0) 18:09:44 executing program 1: r0 = eventfd(0x0) r1 = dup2(r0, r0) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="5500000065ffffff"], 0x15) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000007c0)="22ee0d26f2025a35", 0x8}], 0x1) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "6a85d1e89d5149808782cfd4945bb845faa65f1ce67d36250fb74afa5d6c4ef395e3224fefe8e7e57a210ae7400978035c24b6738ff2023d4b61550fd26a05e0e8a1dfc862fa960ba468d1e178534c644e413d4972cdca796c10e2e3c420e7a2bfd6788c24d1d4dbd9310a91"}, 0xc4) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 18:09:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f00000003c0)="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", 0xfc) 18:09:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000003c0)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_KEY(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000540)={0x1c, r3, 0xdc52d8c3739c760d, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x1c}}, 0x0) 18:09:44 executing program 0: r0 = eventfd(0x0) r1 = dup2(r0, r0) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="5500000065ffffff"], 0x15) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000007c0)="22ee0d26f2025a35", 0x8}], 0x1) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "6a85d1e89d5149808782cfd4945bb845faa65f1ce67d36250fb74afa5d6c4ef395e3224fefe8e7e57a210ae7400978035c24b6738ff2023d4b61550fd26a05e0e8a1dfc862fa960ba468d1e178534c644e413d4972cdca796c10e2e3c420e7a2bfd6788c24d1d4dbd9310a91"}, 0xc4) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 18:09:44 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x801) 18:09:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5424, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, "6323ce9172c63d99"}) 18:09:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f00000003c0)="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", 0xfc) 18:09:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f00000003c0)="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", 0xfc) 18:09:44 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x801) 18:09:44 executing program 1: r0 = eventfd(0x0) r1 = dup2(r0, r0) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="5500000065ffffff"], 0x15) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000007c0)="22ee0d26f2025a35", 0x8}], 0x1) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "6a85d1e89d5149808782cfd4945bb845faa65f1ce67d36250fb74afa5d6c4ef395e3224fefe8e7e57a210ae7400978035c24b6738ff2023d4b61550fd26a05e0e8a1dfc862fa960ba468d1e178534c644e413d4972cdca796c10e2e3c420e7a2bfd6788c24d1d4dbd9310a91"}, 0xc4) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 18:09:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5424, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, "6323ce9172c63d99"}) 18:09:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000003c0)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_KEY(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000540)={0x1c, r3, 0xdc52d8c3739c760d, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x1c}}, 0x0) 18:09:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f00000003c0)="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", 0xfc) 18:09:44 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x801) [ 181.764268][ T26] audit: type=1400 audit(1691777384.839:1615): avc: denied { write } for pid=10197 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 18:09:44 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = add_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000080)="0000762faca256fb00a5a6508aeb09b31b6d597e72df0c71a62b5b1d278883fa276a7d160d1a645a0519f70b4420082f816e535eb6e65c46589356a45d4f3e899cc84093353c6149f5f22a", 0x4b, 0xffffffffffffffff) request_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='logon\x00', r2) [ 181.852998][T10223] dns_resolver: Unsupported server list version (118) 18:09:45 executing program 0: r0 = eventfd(0x0) r1 = dup2(r0, r0) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="5500000065ffffff"], 0x15) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000007c0)="22ee0d26f2025a35", 0x8}], 0x1) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "6a85d1e89d5149808782cfd4945bb845faa65f1ce67d36250fb74afa5d6c4ef395e3224fefe8e7e57a210ae7400978035c24b6738ff2023d4b61550fd26a05e0e8a1dfc862fa960ba468d1e178534c644e413d4972cdca796c10e2e3c420e7a2bfd6788c24d1d4dbd9310a91"}, 0xc4) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 18:09:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5424, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, "6323ce9172c63d99"}) 18:09:45 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x801) 18:09:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x3, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1}}]}, 0xa0}}, 0x0) 18:09:45 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = add_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000080)="0000762faca256fb00a5a6508aeb09b31b6d597e72df0c71a62b5b1d278883fa276a7d160d1a645a0519f70b4420082f816e535eb6e65c46589356a45d4f3e899cc84093353c6149f5f22a", 0x4b, 0xffffffffffffffff) request_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='logon\x00', r2) 18:09:45 executing program 1: r0 = eventfd(0x0) r1 = dup2(r0, r0) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="5500000065ffffff"], 0x15) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000007c0)="22ee0d26f2025a35", 0x8}], 0x1) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "6a85d1e89d5149808782cfd4945bb845faa65f1ce67d36250fb74afa5d6c4ef395e3224fefe8e7e57a210ae7400978035c24b6738ff2023d4b61550fd26a05e0e8a1dfc862fa960ba468d1e178534c644e413d4972cdca796c10e2e3c420e7a2bfd6788c24d1d4dbd9310a91"}, 0xc4) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 18:09:45 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = add_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000080)="0000762faca256fb00a5a6508aeb09b31b6d597e72df0c71a62b5b1d278883fa276a7d160d1a645a0519f70b4420082f816e535eb6e65c46589356a45d4f3e899cc84093353c6149f5f22a", 0x4b, 0xffffffffffffffff) request_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='logon\x00', r2) 18:09:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x3, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1}}]}, 0xa0}}, 0x0) 18:09:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5424, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, "6323ce9172c63d99"}) 18:09:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x3, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1}}]}, 0xa0}}, 0x0) 18:09:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x3, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1}}]}, 0xa0}}, 0x0) 18:09:45 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = add_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000080)="0000762faca256fb00a5a6508aeb09b31b6d597e72df0c71a62b5b1d278883fa276a7d160d1a645a0519f70b4420082f816e535eb6e65c46589356a45d4f3e899cc84093353c6149f5f22a", 0x4b, 0xffffffffffffffff) request_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='logon\x00', r2) [ 181.995211][T10237] dns_resolver: Unsupported server list version (118) [ 182.005396][T10235] dns_resolver: Unsupported server list version (118) [ 182.041799][T10252] dns_resolver: Unsupported server list version (118) 18:09:45 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = add_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000080)="0000762faca256fb00a5a6508aeb09b31b6d597e72df0c71a62b5b1d278883fa276a7d160d1a645a0519f70b4420082f816e535eb6e65c46589356a45d4f3e899cc84093353c6149f5f22a", 0x4b, 0xffffffffffffffff) request_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='logon\x00', r2) 18:09:45 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x2287, &(0x7f0000000000)) 18:09:45 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = add_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000080)="0000762faca256fb00a5a6508aeb09b31b6d597e72df0c71a62b5b1d278883fa276a7d160d1a645a0519f70b4420082f816e535eb6e65c46589356a45d4f3e899cc84093353c6149f5f22a", 0x4b, 0xffffffffffffffff) request_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='logon\x00', r2) 18:09:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x9, 0x7f, 0x0, 0xa7, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf84, 0x0, @perf_config_ext={0x2, 0x8000000000000000}, 0xc0, 0x5, 0x0, 0x3, 0x8000000000000000, 0xf3bb, 0x1, 0x0, 0xffff, 0x0, 0xb5}, r0, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='blkio.bfq.dequeue\x00') ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x8001) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x1d, 0xcd, 0xfb, 0x9, 0x0, 0x100000000, 0x10401, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x1}, 0x10100, 0x10000, 0x3, 0x4, 0x200, 0xd0c, 0xfff, 0x0, 0x5, 0x0, 0xfffffffffffffffb}, 0x0, 0x6, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x20, 0x0, 0x0, 0x80, 0x0, 0x9b, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0xff}, 0x800, 0x2c3d681a, 0x800, 0x3, 0x7, 0x6, 0x1, 0x0, 0x7f, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1f, 0x1, 0x1f, 0x9, 0x0, 0x417d, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20, 0x4, @perf_config_ext={0xfffffffffffff801, 0xdec1}, 0x0, 0x2, 0x9, 0x3, 0x3, 0x2, 0x8000, 0x0, 0x3, 0x0, 0x8628}, r0, 0xc, 0xffffffffffffffff, 0x1b) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080), 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x0, 0x10000000}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, &(0x7f0000000040)) 18:09:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@struct={0x2}]}, {0x0, [0x0, 0x5f, 0x2e, 0x61, 0x1e]}}, 0x0, 0x2b}, 0x20) 18:09:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x9}]}, 0x24}}, 0x0) 18:09:45 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x2287, &(0x7f0000000000)) 18:09:45 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = add_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000080)="0000762faca256fb00a5a6508aeb09b31b6d597e72df0c71a62b5b1d278883fa276a7d160d1a645a0519f70b4420082f816e535eb6e65c46589356a45d4f3e899cc84093353c6149f5f22a", 0x4b, 0xffffffffffffffff) request_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='logon\x00', r2) 18:09:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@struct={0x2}]}, {0x0, [0x0, 0x5f, 0x2e, 0x61, 0x1e]}}, 0x0, 0x2b}, 0x20) 18:09:45 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x1000000, 0x90, [], 0x0, 0x0, &(0x7f0000000040)=[{}, {}, {}]}, 0x108) [ 182.129172][T10257] dns_resolver: Unsupported server list version (118) [ 182.147238][T10263] dns_resolver: Unsupported server list version (118) 18:09:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x9, 0x7f, 0x0, 0xa7, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf84, 0x0, @perf_config_ext={0x2, 0x8000000000000000}, 0xc0, 0x5, 0x0, 0x3, 0x8000000000000000, 0xf3bb, 0x1, 0x0, 0xffff, 0x0, 0xb5}, r0, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='blkio.bfq.dequeue\x00') ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x8001) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x1d, 0xcd, 0xfb, 0x9, 0x0, 0x100000000, 0x10401, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x1}, 0x10100, 0x10000, 0x3, 0x4, 0x200, 0xd0c, 0xfff, 0x0, 0x5, 0x0, 0xfffffffffffffffb}, 0x0, 0x6, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x20, 0x0, 0x0, 0x80, 0x0, 0x9b, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0xff}, 0x800, 0x2c3d681a, 0x800, 0x3, 0x7, 0x6, 0x1, 0x0, 0x7f, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1f, 0x1, 0x1f, 0x9, 0x0, 0x417d, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20, 0x4, @perf_config_ext={0xfffffffffffff801, 0xdec1}, 0x0, 0x2, 0x9, 0x3, 0x3, 0x2, 0x8000, 0x0, 0x3, 0x0, 0x8628}, r0, 0xc, 0xffffffffffffffff, 0x1b) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080), 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x0, 0x10000000}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, &(0x7f0000000040)) 18:09:45 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x2287, &(0x7f0000000000)) 18:09:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@struct={0x2}]}, {0x0, [0x0, 0x5f, 0x2e, 0x61, 0x1e]}}, 0x0, 0x2b}, 0x20) 18:09:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x9}]}, 0x24}}, 0x0) 18:09:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x2}]}, {0x0, [0x0, 0x5f, 0x1e]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 18:09:45 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x1000000, 0x90, [], 0x0, 0x0, &(0x7f0000000040)=[{}, {}, {}]}, 0x108) [ 182.195218][T10275] dns_resolver: Unsupported server list version (118) 18:09:45 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x2287, &(0x7f0000000000)) 18:09:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x9}]}, 0x24}}, 0x0) 18:09:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@struct={0x2}]}, {0x0, [0x0, 0x5f, 0x2e, 0x61, 0x1e]}}, 0x0, 0x2b}, 0x20) 18:09:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x2}]}, {0x0, [0x0, 0x5f, 0x1e]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 18:09:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x9, 0x7f, 0x0, 0xa7, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf84, 0x0, @perf_config_ext={0x2, 0x8000000000000000}, 0xc0, 0x5, 0x0, 0x3, 0x8000000000000000, 0xf3bb, 0x1, 0x0, 0xffff, 0x0, 0xb5}, r0, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='blkio.bfq.dequeue\x00') ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x8001) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x1d, 0xcd, 0xfb, 0x9, 0x0, 0x100000000, 0x10401, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x1}, 0x10100, 0x10000, 0x3, 0x4, 0x200, 0xd0c, 0xfff, 0x0, 0x5, 0x0, 0xfffffffffffffffb}, 0x0, 0x6, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x20, 0x0, 0x0, 0x80, 0x0, 0x9b, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0xff}, 0x800, 0x2c3d681a, 0x800, 0x3, 0x7, 0x6, 0x1, 0x0, 0x7f, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1f, 0x1, 0x1f, 0x9, 0x0, 0x417d, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20, 0x4, @perf_config_ext={0xfffffffffffff801, 0xdec1}, 0x0, 0x2, 0x9, 0x3, 0x3, 0x2, 0x8000, 0x0, 0x3, 0x0, 0x8628}, r0, 0xc, 0xffffffffffffffff, 0x1b) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080), 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x0, 0x10000000}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, &(0x7f0000000040)) 18:09:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000010c0)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x601, 0x0, 0x0, {}, [@NFTA_OBJ_HANDLE={0xc}, @NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 18:09:45 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x1000000, 0x90, [], 0x0, 0x0, &(0x7f0000000040)=[{}, {}, {}]}, 0x108) 18:09:45 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 18:09:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x2}]}, {0x0, [0x0, 0x5f, 0x1e]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 18:09:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x9, 0x7f, 0x0, 0xa7, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf84, 0x0, @perf_config_ext={0x2, 0x8000000000000000}, 0xc0, 0x5, 0x0, 0x3, 0x8000000000000000, 0xf3bb, 0x1, 0x0, 0xffff, 0x0, 0xb5}, r0, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='blkio.bfq.dequeue\x00') ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x8001) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x1d, 0xcd, 0xfb, 0x9, 0x0, 0x100000000, 0x10401, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x1}, 0x10100, 0x10000, 0x3, 0x4, 0x200, 0xd0c, 0xfff, 0x0, 0x5, 0x0, 0xfffffffffffffffb}, 0x0, 0x6, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x20, 0x0, 0x0, 0x80, 0x0, 0x9b, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0xff}, 0x800, 0x2c3d681a, 0x800, 0x3, 0x7, 0x6, 0x1, 0x0, 0x7f, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1f, 0x1, 0x1f, 0x9, 0x0, 0x417d, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20, 0x4, @perf_config_ext={0xfffffffffffff801, 0xdec1}, 0x0, 0x2, 0x9, 0x3, 0x3, 0x2, 0x8000, 0x0, 0x3, 0x0, 0x8628}, r0, 0xc, 0xffffffffffffffff, 0x1b) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080), 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x0, 0x10000000}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, &(0x7f0000000040)) 18:09:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x9}]}, 0x24}}, 0x0) 18:09:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000010c0)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x601, 0x0, 0x0, {}, [@NFTA_OBJ_HANDLE={0xc}, @NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 18:09:45 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x1000000, 0x90, [], 0x0, 0x0, &(0x7f0000000040)=[{}, {}, {}]}, 0x108) 18:09:45 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 18:09:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x2}]}, {0x0, [0x0, 0x5f, 0x1e]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 18:09:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000010c0)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x601, 0x0, 0x0, {}, [@NFTA_OBJ_HANDLE={0xc}, @NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 18:09:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xc, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x10, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @nat={{0x8}, @void}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 18:09:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @dev}, @ib}}, 0x118) 18:09:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) 18:09:45 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 18:09:45 executing program 5: r0 = socket(0x2, 0x2, 0x1) sendto(r0, 0x0, 0x2e, 0x0, 0x0, 0x0) 18:09:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xc, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x10, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @nat={{0x8}, @void}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 18:09:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000010c0)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x601, 0x0, 0x0, {}, [@NFTA_OBJ_HANDLE={0xc}, @NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 18:09:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @dev}, @ib}}, 0x118) 18:09:45 executing program 5: r0 = socket(0x2, 0x2, 0x1) sendto(r0, 0x0, 0x2e, 0x0, 0x0, 0x0) 18:09:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @dev}, @ib}}, 0x118) 18:09:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @dev}, @ib}}, 0x118) 18:09:45 executing program 5: r0 = socket(0x2, 0x2, 0x1) sendto(r0, 0x0, 0x2e, 0x0, 0x0, 0x0) 18:09:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xc, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x10, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @nat={{0x8}, @void}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 18:09:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @dev}, @ib}}, 0x118) 18:09:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) [ 182.457142][ T26] audit: type=1400 audit(1691777385.536:1616): avc: denied { create } for pid=10336 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 182.477162][ T26] audit: type=1400 audit(1691777385.536:1617): avc: denied { write } for pid=10336 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 18:09:45 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 18:09:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x65}, [@call={0x55}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) 18:09:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @dev}, @ib}}, 0x118) 18:09:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) 18:09:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x80}, 0x4) 18:09:45 executing program 5: r0 = socket(0x2, 0x2, 0x1) sendto(r0, 0x0, 0x2e, 0x0, 0x0, 0x0) 18:09:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x65}, [@call={0x55}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) 18:09:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xc, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x10, 0xb, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, @nat={{0x8}, @void}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 18:09:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @dev}, @ib}}, 0x118) 18:09:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) 18:09:45 executing program 0: r0 = fsopen(&(0x7f0000000000)='msdos\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='}\x8e!\x00', &(0x7f00000000c0)='k', 0x1) 18:09:45 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000780)={@local, @link_local, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @rand_addr=0x64010101, {[@generic={0x82, 0x4}]}}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}}}}}, 0x0) 18:09:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x65}, [@call={0x55}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) 18:09:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000000)) 18:09:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x80}, 0x4) 18:09:45 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000780)={@local, @link_local, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @rand_addr=0x64010101, {[@generic={0x82, 0x4}]}}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}}}}}, 0x0) 18:09:45 executing program 3: syz_emit_ethernet(0x60, &(0x7f0000000040)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000080", 0x2a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @local, @dev, [{}]}}}}}}, 0x0) 18:09:45 executing program 0: r0 = fsopen(&(0x7f0000000000)='msdos\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='}\x8e!\x00', &(0x7f00000000c0)='k', 0x1) 18:09:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x65}, [@call={0x55}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) 18:09:45 executing program 0: r0 = fsopen(&(0x7f0000000000)='msdos\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='}\x8e!\x00', &(0x7f00000000c0)='k', 0x1) 18:09:45 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000780)={@local, @link_local, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @rand_addr=0x64010101, {[@generic={0x82, 0x4}]}}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}}}}}, 0x0) 18:09:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000000)) 18:09:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x80}, 0x4) 18:09:45 executing program 3: syz_emit_ethernet(0x60, &(0x7f0000000040)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000080", 0x2a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @local, @dev, [{}]}}}}}}, 0x0) [ 182.677132][ T26] audit: type=1400 audit(1691777385.758:1618): avc: denied { getopt } for pid=10379 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 18:09:45 executing program 0: r0 = fsopen(&(0x7f0000000000)='msdos\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='}\x8e!\x00', &(0x7f00000000c0)='k', 0x1) 18:09:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x80}, 0x4) 18:09:45 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000780)={@local, @link_local, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @rand_addr=0x64010101, {[@generic={0x82, 0x4}]}}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}}}}}, 0x0) 18:09:45 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:45 executing program 0: memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) 18:09:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000000)) 18:09:45 executing program 3: syz_emit_ethernet(0x60, &(0x7f0000000040)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000080", 0x2a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @local, @dev, [{}]}}}}}}, 0x0) 18:09:45 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20046800, 0x0, 0x0) 18:09:45 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:09:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000000)) 18:09:45 executing program 3: syz_emit_ethernet(0x60, &(0x7f0000000040)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000080", 0x2a, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @local, @dev, [{}]}}}}}}, 0x0) 18:09:45 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:45 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20046800, 0x0, 0x0) 18:09:45 executing program 0: memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) 18:09:45 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:09:45 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 182.851257][ T26] audit: type=1400 audit(1691777385.929:1619): avc: denied { write } for pid=10419 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 18:09:46 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:09:46 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:09:46 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20046800, 0x0, 0x0) 18:09:46 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:09:46 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:09:46 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:09:46 executing program 0: memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) 18:09:46 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:46 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20046800, 0x0, 0x0) 18:09:46 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:09:46 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:09:46 executing program 2: memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) 18:09:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0x18, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x2, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0xa0}}, 0x0) 18:09:46 executing program 0: memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) 18:09:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0x18, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x2, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0xa0}}, 0x0) 18:09:46 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:46 executing program 2: memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) 18:09:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0x18, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x2, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0xa0}}, 0x0) 18:09:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0x18, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x2, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, 0xa0}}, 0x0) 18:09:46 executing program 0: r0 = gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r0}) 18:09:46 executing program 2: memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) memfd_create(&(0x7f0000000040)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\q\x81\xcf\x81\xba\xe51\xf5 \xc8\x10\x03\xd6\n\xb0\xd5\xa2\xe2b\xb3/\x8f\xdc&>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x14\x02\xb9~B\x9f\xacL\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2d\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xff\xffQ\x80Fy\xb5\xe4q\xea\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f6\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae8\xd9\x02U\x93;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88~\x84X\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c20\a\xe0>\x00'/450, 0x0) 18:09:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=@acquire={0x134, 0x17, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, @in, {@in6=@private2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@offload={0x28}]}, 0x134}}, 0x0) 18:09:46 executing program 0: r0 = gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r0}) 18:09:46 executing program 3: r0 = gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r0}) 18:09:46 executing program 0: r0 = gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r0}) 18:09:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=@acquire={0x134, 0x17, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, @in, {@in6=@private2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@offload={0x28}]}, 0x134}}, 0x0) 18:09:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:46 executing program 3: r0 = gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r0}) 18:09:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:09:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=@acquire={0x134, 0x17, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, @in, {@in6=@private2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@offload={0x28}]}, 0x134}}, 0x0) 18:09:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x24, 0x7, [@fwd, @array]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/65, 0x43, 0x41, 0x1}, 0x20) 18:09:46 executing program 3: r0 = gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r0}) 18:09:46 executing program 0: r0 = gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r0}) 18:09:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=@acquire={0x134, 0x17, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, @in, {@in6=@private2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {{@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@offload={0x28}]}, 0x134}}, 0x0) 18:09:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x24, 0x7, [@fwd, @array]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/65, 0x43, 0x41, 0x1}, 0x20) 18:09:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x3, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 18:09:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x70, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x40, 0x2, [@TCA_BASIC_EMATCHES={0x3c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x2c, 0x1, 0x0, 0x0, {{0x0, 0x7}, "8650345bdace9772f11bca40909c7175714595ec94857e66cd5c05e028"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x70}}, 0x0) 18:09:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x3, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 18:09:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001280)={0x1a, 0x3, &(0x7f0000000000)=@framed={{0x61}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x24, 0x7, [@fwd, @array]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/65, 0x43, 0x41, 0x1}, 0x20) 18:09:46 executing program 5: mount$9p_fd(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@seclabel}, {@context={'context', 0x2c, 'staff_u'}, 0x22}]}}) 18:09:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x70, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x40, 0x2, [@TCA_BASIC_EMATCHES={0x3c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x2c, 0x1, 0x0, 0x0, {{0x0, 0x7}, "8650345bdace9772f11bca40909c7175714595ec94857e66cd5c05e028"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x70}}, 0x0) 18:09:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x3, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 18:09:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5, 0x3, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 18:09:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001280)={0x1a, 0x3, &(0x7f0000000000)=@framed={{0x61}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x24, 0x7, [@fwd, @array]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/65, 0x43, 0x41, 0x1}, 0x20) 18:09:46 executing program 5: mount$9p_fd(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@seclabel}, {@context={'context', 0x2c, 'staff_u'}, 0x22}]}}) 18:09:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x3, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 18:09:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5, 0x3, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 18:09:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x70, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x40, 0x2, [@TCA_BASIC_EMATCHES={0x3c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x2c, 0x1, 0x0, 0x0, {{0x0, 0x7}, "8650345bdace9772f11bca40909c7175714595ec94857e66cd5c05e028"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x70}}, 0x0) 18:09:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001280)={0x1a, 0x3, &(0x7f0000000000)=@framed={{0x61}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 183.351347][T10543] 9pnet_fd: Insufficient options for proto=fd 18:09:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e0c00000060f18a6f1b4920d0", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff0}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) 18:09:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5, 0x3, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 18:09:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) sendfile(r1, r0, 0x0, 0x3ffff) io_submit(0x0, 0x0, &(0x7f00000000c0)) sendfile(r1, r0, 0x0, 0x7ffff000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) write$binfmt_elf64(r3, 0x0, 0x40) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0xfeffffff, &(0x7f0000000400)={&(0x7f0000000180)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 18:09:46 executing program 5: mount$9p_fd(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@seclabel}, {@context={'context', 0x2c, 'staff_u'}, 0x22}]}}) [ 183.415382][T10559] 9pnet_fd: Insufficient options for proto=fd 18:09:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001280)={0x1a, 0x3, &(0x7f0000000000)=@framed={{0x61}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x70, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x40, 0x2, [@TCA_BASIC_EMATCHES={0x3c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x2c, 0x1, 0x0, 0x0, {{0x0, 0x7}, "8650345bdace9772f11bca40909c7175714595ec94857e66cd5c05e028"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1df}}]}]}}]}, 0x70}}, 0x0) 18:09:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e0c00000060f18a6f1b4920d0", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff0}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) 18:09:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5, 0x3, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) 18:09:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e0c00000060f18a6f1b4920d0", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff0}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) 18:09:46 executing program 5: mount$9p_fd(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@seclabel}, {@context={'context', 0x2c, 'staff_u'}, 0x22}]}}) [ 183.458408][T10569] 9pnet_fd: Insufficient options for proto=fd 18:09:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:46 executing program 4: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x408) 18:09:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) sendfile(r1, r0, 0x0, 0x3ffff) io_submit(0x0, 0x0, &(0x7f00000000c0)) sendfile(r1, r0, 0x0, 0x7ffff000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) write$binfmt_elf64(r3, 0x0, 0x40) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0xfeffffff, &(0x7f0000000400)={&(0x7f0000000180)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 18:09:46 executing program 4: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x408) 18:09:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e0c00000060f18a6f1b4920d0", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff0}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) 18:09:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e0c00000060f18a6f1b4920d0", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff0}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) 18:09:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {0x25}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 18:09:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) sendfile(r1, r0, 0x0, 0x3ffff) io_submit(0x0, 0x0, &(0x7f00000000c0)) sendfile(r1, r0, 0x0, 0x7ffff000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) write$binfmt_elf64(r3, 0x0, 0x40) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0xfeffffff, &(0x7f0000000400)={&(0x7f0000000180)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 18:09:46 executing program 4: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x408) [ 183.560899][T10586] 9pnet_fd: Insufficient options for proto=fd [ 183.571523][ T26] audit: type=1400 audit(1691777386.656:1620): avc: denied { unmount } for pid=3090 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 18:09:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {0x25}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 18:09:46 executing program 4: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x408) 18:09:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e0c00000060f18a6f1b4920d0", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff0}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) [ 183.837923][ T26] audit: type=1400 audit(1691777386.928:1621): avc: denied { map } for pid=10585 comm="syz-executor.0" path="socket:[39892]" dev="sockfs" ino=39892 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 183.865233][ T26] audit: type=1400 audit(1691777386.958:1622): avc: denied { read } for pid=10585 comm="syz-executor.0" path="socket:[39893]" dev="sockfs" ino=39893 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 18:09:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:47 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e0c00000060f18a6f1b4920d0", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff0}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) 18:09:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {0x25}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 18:09:47 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1804000000000000000000004b64ffec850000006d000000760000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x54) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x7fff}) 18:09:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) sendfile(r1, r0, 0x0, 0x3ffff) io_submit(0x0, 0x0, &(0x7f00000000c0)) sendfile(r1, r0, 0x0, 0x7ffff000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) write$binfmt_elf64(r3, 0x0, 0x40) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0xfeffffff, &(0x7f0000000400)={&(0x7f0000000180)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 18:09:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'macvtap0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x24, "5db987e61d959bc0a3aba964123d80cefd3b5ec25c0b71c6d9ee753293d6bcbb", "78810c879e517faa34272564b2e9cb88dcc0b77856b784f70fa9eaa7c6621acc", "83ecc2677e913db48ff2fb42dcdca22eec1a14b2e6d3d958d56738d8603f3b6d", "9556d6c0e7e7d5f3fa9ee1f34d959b74eebf4c52afd4e37a4841752a6325884a", "2315ea0c1e3cd1bf1e184647d6102ba51f9c0c432ef869e6a3ffd408ff235a9f", "7c653cc7ee8d0b41c76be943"}}) 18:09:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {0x25}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 18:09:47 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1804000000000000000000004b64ffec850000006d000000760000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x54) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x7fff}) 18:09:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'macvtap0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x24, "5db987e61d959bc0a3aba964123d80cefd3b5ec25c0b71c6d9ee753293d6bcbb", "78810c879e517faa34272564b2e9cb88dcc0b77856b784f70fa9eaa7c6621acc", "83ecc2677e913db48ff2fb42dcdca22eec1a14b2e6d3d958d56738d8603f3b6d", "9556d6c0e7e7d5f3fa9ee1f34d959b74eebf4c52afd4e37a4841752a6325884a", "2315ea0c1e3cd1bf1e184647d6102ba51f9c0c432ef869e6a3ffd408ff235a9f", "7c653cc7ee8d0b41c76be943"}}) [ 184.412184][T10620] __nla_validate_parse: 24 callbacks suppressed [ 184.412201][T10620] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 18:09:47 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:47 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1804000000000000000000004b64ffec850000006d000000760000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x54) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x7fff}) 18:09:47 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'macvtap0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x24, "5db987e61d959bc0a3aba964123d80cefd3b5ec25c0b71c6d9ee753293d6bcbb", "78810c879e517faa34272564b2e9cb88dcc0b77856b784f70fa9eaa7c6621acc", "83ecc2677e913db48ff2fb42dcdca22eec1a14b2e6d3d958d56738d8603f3b6d", "9556d6c0e7e7d5f3fa9ee1f34d959b74eebf4c52afd4e37a4841752a6325884a", "2315ea0c1e3cd1bf1e184647d6102ba51f9c0c432ef869e6a3ffd408ff235a9f", "7c653cc7ee8d0b41c76be943"}}) 18:09:48 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:48 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1804000000000000000000004b64ffec850000006d000000760000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x54) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x7fff}) 18:09:48 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:48 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'macvtap0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x24, "5db987e61d959bc0a3aba964123d80cefd3b5ec25c0b71c6d9ee753293d6bcbb", "78810c879e517faa34272564b2e9cb88dcc0b77856b784f70fa9eaa7c6621acc", "83ecc2677e913db48ff2fb42dcdca22eec1a14b2e6d3d958d56738d8603f3b6d", "9556d6c0e7e7d5f3fa9ee1f34d959b74eebf4c52afd4e37a4841752a6325884a", "2315ea0c1e3cd1bf1e184647d6102ba51f9c0c432ef869e6a3ffd408ff235a9f", "7c653cc7ee8d0b41c76be943"}}) 18:09:48 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:48 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:49 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:49 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:49 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:50 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @empty}]}}}]}, 0x3c}}, 0x0) 18:09:50 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) 18:09:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @empty}]}}}]}, 0x3c}}, 0x0) 18:09:50 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) 18:09:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @empty}]}}}]}, 0x3c}}, 0x0) 18:09:50 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) 18:09:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x14) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/88, 0x58}], 0x1) 18:09:50 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x1) mkdirat(r1, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) openat(0xffffffffffffffff, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x222001, 0x110) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) read(r3, &(0x7f0000000100)=""/26, 0x1a) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f00000004c0)=[{&(0x7f0000000e80)=""/79, 0x4f}], 0x1, &(0x7f0000001480), 0x0, 0x0) 18:09:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @empty}]}}}]}, 0x3c}}, 0x0) 18:09:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x14) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/88, 0x58}], 0x1) [ 187.367603][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 18:09:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x14) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/88, 0x58}], 0x1) 18:09:51 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000dc0), 0xffffffffffffffff) 18:09:51 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) 18:09:51 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) fcntl$setstatus(r1, 0x4, 0x4400) dup3(r1, r0, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r4, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x54000}]) 18:09:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@fwd={0x5}, @typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x5f, 0x30]}}, 0x0, 0x38}, 0x20) 18:09:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, 0x35, 0x9, 0x0, 0x0, {0x2}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @binary="b4"}]}]}, 0x24}}, 0x0) 18:09:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x14) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/88, 0x58}], 0x1) 18:09:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@fwd={0x5}, @typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x5f, 0x30]}}, 0x0, 0x38}, 0x20) [ 187.973604][T10809] openvswitch: netlink: Key 0 has unexpected len 1 expected 0 18:09:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@fwd={0x5}, @typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x5f, 0x30]}}, 0x0, 0x38}, 0x20) 18:09:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, 0x35, 0x9, 0x0, 0x0, {0x2}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @binary="b4"}]}]}, 0x24}}, 0x0) 18:09:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@ldst={0x5, 0x2}]}, &(0x7f00000002c0)='GPL\x00', 0x9, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x23) 18:09:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x44, r1, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x5}]}]}]}, 0x44}}, 0x0) 18:09:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') read$rfkill(r0, 0x0, 0x2000000) 18:09:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@fwd={0x5}, @typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x5f, 0x30]}}, 0x0, 0x38}, 0x20) 18:09:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@ldst={0x5, 0x2}]}, &(0x7f00000002c0)='GPL\x00', 0x9, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x23) [ 188.095760][T10820] openvswitch: netlink: Key 0 has unexpected len 1 expected 0 18:09:51 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) fcntl$setstatus(r1, 0x4, 0x4400) dup3(r1, r0, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r4, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x54000}]) 18:09:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, 0x35, 0x9, 0x0, 0x0, {0x2}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @binary="b4"}]}]}, 0x24}}, 0x0) 18:09:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') read$rfkill(r0, 0x0, 0x2000000) 18:09:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@ldst={0x5, 0x2}]}, &(0x7f00000002c0)='GPL\x00', 0x9, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x23) 18:09:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0xd, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x34}}, 0x0) 18:09:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x44, r1, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x5}]}]}]}, 0x44}}, 0x0) 18:09:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0xd, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x34}}, 0x0) 18:09:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@ldst={0x5, 0x2}]}, &(0x7f00000002c0)='GPL\x00', 0x9, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x23) 18:09:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') read$rfkill(r0, 0x0, 0x2000000) 18:09:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x44, r1, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x5}]}]}]}, 0x44}}, 0x0) 18:09:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, 0x35, 0x9, 0x0, 0x0, {0x2}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @binary="b4"}]}]}, 0x24}}, 0x0) [ 188.331916][T10841] openvswitch: netlink: Key 0 has unexpected len 1 expected 0 18:09:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') read$rfkill(r0, 0x0, 0x2000000) [ 188.379893][T10850] openvswitch: netlink: Key 0 has unexpected len 1 expected 0 [ 188.474971][T10856] ================================================================== [ 188.483116][T10856] BUG: KCSAN: data-race in generic_write_end / mpage_process_page_bufs [ 188.491500][T10856] [ 188.493841][T10856] write to 0xffff88810a0bca98 of 8 bytes by task 10853 on cpu 0: [ 188.501677][T10856] generic_write_end+0x9f/0x240 [ 188.506572][T10856] ext4_da_write_end+0x49e/0x700 [ 188.511547][T10856] generic_perform_write+0x26d/0x410 [ 188.516959][T10856] ext4_buffered_write_iter+0x1f6/0x370 [ 188.522543][T10856] ext4_file_write_iter+0x283/0x1230 [ 188.527872][T10856] aio_write+0x2e7/0x400 [ 188.532138][T10856] io_submit_one+0xb39/0x1250 [ 188.536848][T10856] __se_sys_io_submit+0xf5/0x280 [ 188.541826][T10856] __x64_sys_io_submit+0x43/0x50 [ 188.546805][T10856] do_syscall_64+0x41/0xc0 [ 188.551251][T10856] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 188.557182][T10856] [ 188.559519][T10856] read to 0xffff88810a0bca98 of 8 bytes by task 10856 on cpu 1: [ 188.567165][T10856] mpage_process_page_bufs+0x34/0x5e0 [ 188.572571][T10856] mpage_prepare_extent_to_map+0x794/0xb90 [ 188.578421][T10856] ext4_do_writepages+0xa5e/0x21e0 [ 188.583561][T10856] ext4_writepages+0x15e/0x2e0 [ 188.588342][T10856] do_writepages+0x1c5/0x340 [ 188.592955][T10856] filemap_fdatawrite_wbc+0xdb/0xf0 [ 188.598155][T10856] filemap_flush+0x95/0xc0 [ 188.602587][T10856] ext4_alloc_da_blocks+0x50/0x130 [ 188.607723][T10856] ext4_release_file+0x5f/0x1c0 [ 188.612582][T10856] __fput+0x2fd/0x600 [ 188.616560][T10856] ____fput+0x15/0x20 [ 188.620537][T10856] task_work_run+0x135/0x1a0 [ 188.625129][T10856] exit_to_user_mode_loop+0xd1/0xe0 [ 188.630335][T10856] exit_to_user_mode_prepare+0x6c/0xb0 [ 188.635803][T10856] syscall_exit_to_user_mode+0x26/0x140 [ 188.641355][T10856] do_syscall_64+0x4d/0xc0 [ 188.645771][T10856] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 188.651672][T10856] [ 188.653992][T10856] value changed: 0x0000000000597000 -> 0x0000000000599000 [ 188.661276][T10856] [ 188.663600][T10856] Reported by Kernel Concurrency Sanitizer on: [ 188.669843][T10856] CPU: 1 PID: 10856 Comm: syz-executor.1 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 188.680276][T10856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 188.690417][T10856] ================================================================== [ 188.702947][ T26] audit: type=1400 audit(1691777391.823:1623): avc: denied { unlink } for pid=2749 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 18:09:51 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) fcntl$setstatus(r1, 0x4, 0x4400) dup3(r1, r0, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r4, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x54000}]) 18:09:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x44, r1, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x5}]}]}]}, 0x44}}, 0x0) 18:09:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0xd, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x34}}, 0x0) 18:09:51 executing program 5: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) fcntl$setstatus(r1, 0x4, 0x4400) dup3(r1, r0, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r4, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x54000}]) 18:09:51 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, r1}, [@IFLA_CARRIER={0x5}]}, 0x28}}, 0x0) 18:09:51 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f00000001c0)='./file0\x00', 0x4000a, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES8, @ANYRES16=r0], 0x7, 0x301, &(0x7f00000005c0)="$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") mount(0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000140)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000900)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) 18:09:52 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, r1}, [@IFLA_CARRIER={0x5}]}, 0x28}}, 0x0) 18:09:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0xd, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x34}}, 0x0) 18:09:52 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14997e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), 0x4) 18:09:52 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14997e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), 0x4) 18:09:52 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, r1}, [@IFLA_CARRIER={0x5}]}, 0x28}}, 0x0) 18:09:52 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) [ 188.973361][ T26] audit: type=1400 audit(1691777392.094:1624): avc: denied { create } for pid=10879 comm="syz-executor.3" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 [ 188.982572][T10881] block device autoloading is deprecated and will be removed. [ 189.010944][ T26] audit: type=1400 audit(1691777392.094:1625): avc: denied { write } for pid=10879 comm="syz-executor.3" name="file0" dev="sda1" ino=1974 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 [ 189.033832][ T26] audit: type=1400 audit(1691777392.094:1626): avc: denied { open } for pid=10879 comm="syz-executor.3" path="/root/syzkaller-testdir1782479684/syzkaller.YzkI3N/456/file0" dev="sda1" ino=1974 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 [ 189.121595][ T26] audit: type=1400 audit(1691777392.245:1627): avc: denied { unlink } for pid=3112 comm="syz-executor.3" name="file0" dev="sda1" ino=1974 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 18:09:52 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14997e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), 0x4) 18:09:52 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, r1}, [@IFLA_CARRIER={0x5}]}, 0x28}}, 0x0) 18:09:52 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) fcntl$setstatus(r1, 0x4, 0x4400) dup3(r1, r0, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r4, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x54000}]) 18:09:52 executing program 5: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) fcntl$setstatus(r1, 0x4, 0x4400) dup3(r1, r0, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r4, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x54000}]) 18:09:52 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) [ 189.381996][ T26] audit: type=1400 audit(1691777392.507:1628): avc: denied { ioctl } for pid=10887 comm="syz-executor.3" path="/root/syzkaller-testdir1782479684/syzkaller.YzkI3N/457/file0" dev="sda1" ino=1973 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 18:09:52 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f00000001c0)='./file0\x00', 0x4000a, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES8, @ANYRES16=r0], 0x7, 0x301, &(0x7f00000005c0)="$eJzs3L9rE2Ecx/Fv86tJSpMMoihIHnTR5WjjLg3SghiwtI3YDsK1vWjImZRcqETEurmKf4RDcewiBe0/0MXNycVFuggOFiye5HLX/Gja2vRHavt+QbkneZ7P3fO01/C9wN3GwzdPCzlLy+kV8YWV9ImIbIokxCeePnfrc9ohafZKbg78/HJ1cnrmXjqTGZ1Qaiw9dSullIolPz57EXGHrfbLeuLRxo/Ut/WL65c3/kw9yVsqb6liqaJ0NVv6WtFnTUPN562CptS4aeiWofJFyyjX+0u1/hHJmaWFharSi/OD0YWyYVlKL1ZVwaiqSklVylWlP9bzRaVpmhqMCvaT/T4xoae7DM8d8WRwTMrltO4XkciOnuxyTyYEAAB6qr3+99VK+q7qf4k59X9tcKP+f39trTLwYCXm1v+roU71v7evlvo/LCJt9b+hjrr+31kRnS/Z5UPU/zgdkqEdb/W1vKrV/1H3/1ck3NRD/Q8AAAAAAAAAAAAAAAAAAAAAwP9g07bjtm3Hva3307iFwH2NM2m3v3+/e6fI9vmAM2lyekbCzo17gZiI+Xoxu5itb90BayJiiiFDEpct53xw1dohEQmKiKpJyCdzyc0vLWb9Tjydk7yTH5a4JCQpLXnbHrubGR1Wda35oESb8ymJy4X249fzqUb+t23bbj4kN6435TWJy+c5KYkp88553ci/HFbqzv1M2/EjzjgAAAAAAM4CTW3reP2uabv11/Pb19cdvx+oX18Pdby+D8SvBHq7dgAAAAAAzgur+rygm6ZR3qMRkf3HdN8IdBcP7jXG37TCf91hyH0y6vGtdI+G9wjXli7vSa3d7dlb//HM2SfdpJK1+ajDHt372mi3MTLe/br8B0v5Wqdx6e27X0f3e769Et5npQdpfNg6wODgSXz2AAAAADhZjaLfe2ektxMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAcOonn2/V6jQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMBp8TcAAP//k9cB2w==") mount(0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000140)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000900)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) 18:09:52 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14997e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), 0x4) 18:09:52 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) 18:09:52 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) 18:09:52 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f00000001c0)='./file0\x00', 0x4000a, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES8, @ANYRES16=r0], 0x7, 0x301, &(0x7f00000005c0)="$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") mount(0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000140)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000900)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) [ 189.721413][T10900] block device autoloading is deprecated and will be removed. [ 189.731597][T10903] blktrace: Concurrent blktraces are not allowed on loop6 18:09:52 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) 18:09:53 executing program 5: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) fcntl$setstatus(r1, 0x4, 0x4400) dup3(r1, r0, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r4, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x54000}]) 18:09:53 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) [ 189.881776][T10911] blktrace: Concurrent blktraces are not allowed on loop6 18:09:53 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) 18:09:53 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) [ 189.972167][T10915] blktrace: Concurrent blktraces are not allowed on loop0 [ 190.009492][T10918] blktrace: Concurrent blktraces are not allowed on loop6 18:09:53 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) [ 190.021687][T10920] block device autoloading is deprecated and will be removed. 18:09:53 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) [ 190.115550][T10926] blktrace: Concurrent blktraces are not allowed on loop0 [ 190.187101][T10928] blktrace: Concurrent blktraces are not allowed on loop2 18:09:53 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f00000001c0)='./file0\x00', 0x4000a, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES8, @ANYRES16=r0], 0x7, 0x301, &(0x7f00000005c0)="$eJzs3L9rE2Ecx/Fv86tJSpMMoihIHnTR5WjjLg3SghiwtI3YDsK1vWjImZRcqETEurmKf4RDcewiBe0/0MXNycVFuggOFiye5HLX/Gja2vRHavt+QbkneZ7P3fO01/C9wN3GwzdPCzlLy+kV8YWV9ImIbIokxCeePnfrc9ohafZKbg78/HJ1cnrmXjqTGZ1Qaiw9dSullIolPz57EXGHrfbLeuLRxo/Ut/WL65c3/kw9yVsqb6liqaJ0NVv6WtFnTUPN562CptS4aeiWofJFyyjX+0u1/hHJmaWFharSi/OD0YWyYVlKL1ZVwaiqSklVylWlP9bzRaVpmhqMCvaT/T4xoae7DM8d8WRwTMrltO4XkciOnuxyTyYEAAB6qr3+99VK+q7qf4k59X9tcKP+f39trTLwYCXm1v+roU71v7evlvo/LCJt9b+hjrr+31kRnS/Z5UPU/zgdkqEdb/W1vKrV/1H3/1ck3NRD/Q8AAAAAAAAAAAAAAAAAAAAAwP9g07bjtm3Hva3307iFwH2NM2m3v3+/e6fI9vmAM2lyekbCzo17gZiI+Xoxu5itb90BayJiiiFDEpct53xw1dohEQmKiKpJyCdzyc0vLWb9Tjydk7yTH5a4JCQpLXnbHrubGR1Wda35oESb8ymJy4X249fzqUb+t23bbj4kN6435TWJy+c5KYkp88553ci/HFbqzv1M2/EjzjgAAAAAAM4CTW3reP2uabv11/Pb19cdvx+oX18Pdby+D8SvBHq7dgAAAAAAzgur+rygm6ZR3qMRkf3HdN8IdBcP7jXG37TCf91hyH0y6vGtdI+G9wjXli7vSa3d7dlb//HM2SfdpJK1+ajDHt372mi3MTLe/br8B0v5Wqdx6e27X0f3e769Et5npQdpfNg6wODgSXz2AAAAADhZjaLfe2ektxMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAcOonn2/V6jQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMBp8TcAAP//k9cB2w==") mount(0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000140)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000900)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) 18:09:53 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) 18:09:53 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) 18:09:53 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) [ 190.608416][T10933] blktrace: Concurrent blktraces are not allowed on loop6 [ 190.612309][T10936] loop2: detected capacity change from 0 to 128 [ 190.622203][T10934] blktrace: Concurrent blktraces are not allowed on loop2 [ 190.636358][T10932] blktrace: Concurrent blktraces are not allowed on loop0 18:09:54 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f00000001c0)='./file0\x00', 0x4000a, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES8, @ANYRES16=r0], 0x7, 0x301, &(0x7f00000005c0)="$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") mount(0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000140)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000900)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) 18:09:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000140)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x40}}, 0x0) 18:09:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000580), 0x1, 0x4fb, &(0x7f00000005c0)="$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") 18:09:54 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) 18:09:54 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) 18:09:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000580), 0x1, 0x4fb, &(0x7f00000005c0)="$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") 18:09:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000140)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x40}}, 0x0) [ 191.019750][T10946] blktrace: Concurrent blktraces are not allowed on loop0 [ 191.026373][T10944] blktrace: Concurrent blktraces are not allowed on loop6 18:09:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000580), 0x1, 0x4fb, &(0x7f00000005c0)="$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") 18:09:56 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f00000001c0)='./file0\x00', 0x4000a, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES8, @ANYRES16=r0], 0x7, 0x301, &(0x7f00000005c0)="$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") mount(0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000140)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000900)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) 18:09:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000140)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x40}}, 0x0) 18:09:56 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='mm_vmscan_kswapd_sleep\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x3) close(0xffffffffffffffff) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x14e) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000840)={'\x00', 0x800, 0xf, 0x67, 0xffffffffffffffff, 0xfe, 0xffffffffffffffff}) unshare(0x6c060000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x89e8, &(0x7f0000000480)="70e34cab6366d82024ae3c21b44a0afa4d0f6a2a9dc428a1a004ec59d5584f31d1588cb8809012ab8e07e195ad581d13c5dfdf181dbca0ebdefe5545568043488bcda9b461a6f9c1a1a353ce7d58614b85803c3fb97f713b606bb155c1511ecfa9f24ff23eeb8f8dd7fc7f58de57a9d88b12") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@private0, 0x0, 0x0, 0x3, 0x0, 0x4001, 0x2}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x8000000, 0x0, 0x2, 0x0, 0x4}, 0x7c) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x3041555de7b5f663) creat(&(0x7f0000000300)='./file1\x00', 0x1) ftruncate(r7, 0x8200) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRES64], 0x18}}, 0x401) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x808001, 0x3c) close(r1) dup2(r0, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="d00000001000000125bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00040400218000000a0002009a1b96ae270c0000600019800c00020028267d287d7d250009000200c75c5e2e000000000a000200252ad41f2c00000014000400330cfd7cc2b1a5e38b77cf0478ab92fc0500060012000000140004003b6ba987f00d99ea601fd0b93de4f74008000100f8ffffff040034801400140069703665727370616e3000000000000024000e00ffffff7f0000000007000000000000000000000000bc335cbe007a010000000008001300", @ANYRES64, @ANYBLOB], 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp6\x00') pread64(r8, &(0x7f0000001100)=""/108, 0x6c, 0x48d8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000006ce116961d8c6f7852e2199a6fd9100000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x80) 18:09:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000580), 0x1, 0x4fb, &(0x7f00000005c0)="$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") 18:09:56 executing program 3: io_setup(0x202, &(0x7f0000000200)=0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000440)={0x0, 0x20011004, 0x4, 0x1, 0x0, r1, &(0x7f00000000c0)='!', 0x1}]) 18:09:56 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f00000001c0)='./file0\x00', 0x4000a, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRES8, @ANYRES16=r0], 0x7, 0x301, &(0x7f00000005c0)="$eJzs3L9rE2Ecx/Fv86tJSpMMoihIHnTR5WjjLg3SghiwtI3YDsK1vWjImZRcqETEurmKf4RDcewiBe0/0MXNycVFuggOFiye5HLX/Gja2vRHavt+QbkneZ7P3fO01/C9wN3GwzdPCzlLy+kV8YWV9ImIbIokxCeePnfrc9ohafZKbg78/HJ1cnrmXjqTGZ1Qaiw9dSullIolPz57EXGHrfbLeuLRxo/Ut/WL65c3/kw9yVsqb6liqaJ0NVv6WtFnTUPN562CptS4aeiWofJFyyjX+0u1/hHJmaWFharSi/OD0YWyYVlKL1ZVwaiqSklVylWlP9bzRaVpmhqMCvaT/T4xoae7DM8d8WRwTMrltO4XkciOnuxyTyYEAAB6qr3+99VK+q7qf4k59X9tcKP+f39trTLwYCXm1v+roU71v7evlvo/LCJt9b+hjrr+31kRnS/Z5UPU/zgdkqEdb/W1vKrV/1H3/1ck3NRD/Q8AAAAAAAAAAAAAAAAAAAAAwP9g07bjtm3Hva3307iFwH2NM2m3v3+/e6fI9vmAM2lyekbCzo17gZiI+Xoxu5itb90BayJiiiFDEpct53xw1dohEQmKiKpJyCdzyc0vLWb9Tjydk7yTH5a4JCQpLXnbHrubGR1Wda35oESb8ymJy4X249fzqUb+t23bbj4kN6435TWJy+c5KYkp88553ci/HFbqzv1M2/EjzjgAAAAAAM4CTW3reP2uabv11/Pb19cdvx+oX18Pdby+D8SvBHq7dgAAAAAAzgur+rygm6ZR3qMRkf3HdN8IdBcP7jXG37TCf91hyH0y6vGtdI+G9wjXli7vSa3d7dlb//HM2SfdpJK1+ajDHt372mi3MTLe/br8B0v5Wqdx6e27X0f3e769Et5npQdpfNg6wODgSXz2AAAAADhZjaLfe2ektxMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAcOonn2/V6jQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMBp8TcAAP//k9cB2w==") mount(0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000140)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000900)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) 18:09:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000140)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x40}}, 0x0) 18:09:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000700)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x8, 0x1, {0xfffffffc}}]}]}]}]}, 0x40}}, 0x0) [ 193.156222][T10968] blktrace: Concurrent blktraces are not allowed on loop0 [ 193.171838][T10971] loop2: detected capacity change from 0 to 128 18:09:56 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x8002) writev(r0, &(0x7f0000001240)=[{&(0x7f0000000100)="f0f76592af5c4802511513b097d2ec54fe119f764d610f96c66d1acd", 0x1c}, {0x0}, {0x0}], 0x3) 18:09:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000700)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x8, 0x1, {0xfffffffc}}]}]}]}]}, 0x40}}, 0x0) 18:09:56 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x8002) writev(r0, &(0x7f0000001240)=[{&(0x7f0000000100)="f0f76592af5c4802511513b097d2ec54fe119f764d610f96c66d1acd", 0x1c}, {0x0}, {0x0}], 0x3) 18:09:56 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1000000000000, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:09:58 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x8002) writev(r0, &(0x7f0000001240)=[{&(0x7f0000000100)="f0f76592af5c4802511513b097d2ec54fe119f764d610f96c66d1acd", 0x1c}, {0x0}, {0x0}], 0x3) 18:09:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000700)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x8, 0x1, {0xfffffffc}}]}]}]}]}, 0x40}}, 0x0) 18:09:58 executing program 3: io_setup(0x202, &(0x7f0000000200)=0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000440)={0x0, 0x20011004, 0x4, 0x1, 0x0, r1, &(0x7f00000000c0)='!', 0x1}]) 18:09:58 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1000000000000, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:09:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00000000c0)="0bbb268dd6ffa80800000000000000000000210d0000aaa8fa017242ba9380d440fe0000000000002900000003000000", 0xfe60) 18:09:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x3}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) socket$nl_generic(0x10, 0x3, 0x10) 18:09:58 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1000000000000, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:09:58 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x8002) writev(r0, &(0x7f0000001240)=[{&(0x7f0000000100)="f0f76592af5c4802511513b097d2ec54fe119f764d610f96c66d1acd", 0x1c}, {0x0}, {0x0}], 0x3) 18:09:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00000000c0)="0bbb268dd6ffa80800000000000000000000210d0000aaa8fa017242ba9380d440fe0000000000002900000003000000", 0xfe60) 18:09:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000700)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x20, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x8, 0x1, {0xfffffffc}}]}]}]}]}, 0x40}}, 0x0) 18:09:58 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1000000000000, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:09:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00000000c0)="0bbb268dd6ffa80800000000000000000000210d0000aaa8fa017242ba9380d440fe0000000000002900000003000000", 0xfe60) 18:09:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x3}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) socket$nl_generic(0x10, 0x3, 0x10) 18:09:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 18:09:58 executing program 3: io_setup(0x202, &(0x7f0000000200)=0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000440)={0x0, 0x20011004, 0x4, 0x1, 0x0, r1, &(0x7f00000000c0)='!', 0x1}]) 18:09:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00000000c0)="0bbb268dd6ffa80800000000000000000000210d0000aaa8fa017242ba9380d440fe0000000000002900000003000000", 0xfe60) 18:09:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 18:09:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x3}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) socket$nl_generic(0x10, 0x3, 0x10) 18:09:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x68, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x30, 0x2, [@m_ctinfo={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) 18:09:58 executing program 0: r0 = socket(0x2, 0x80805, 0x0) socket(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x76, &(0x7f0000000000)={r2}, 0x8) 18:09:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x3}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) socket$nl_generic(0x10, 0x3, 0x10) 18:09:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 18:09:58 executing program 4: mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x1) shmdt(0x0) 18:09:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='fd\x00') getdents(r0, 0x0, 0x0) [ 195.027742][T11019] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 18:09:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 18:09:58 executing program 0: r0 = socket(0x2, 0x80805, 0x0) socket(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x76, &(0x7f0000000000)={r2}, 0x8) [ 195.101000][T11019] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 18:09:58 executing program 3: io_setup(0x202, &(0x7f0000000200)=0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000440)={0x0, 0x20011004, 0x4, 0x1, 0x0, r1, &(0x7f00000000c0)='!', 0x1}]) 18:09:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='fd\x00') getdents(r0, 0x0, 0x0) 18:09:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0xffffffff}, {}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$netlink(0x10, 0x3, 0x0) 18:09:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x68, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x30, 0x2, [@m_ctinfo={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) 18:09:58 executing program 0: r0 = socket(0x2, 0x80805, 0x0) socket(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x76, &(0x7f0000000000)={r2}, 0x8) 18:09:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='fd\x00') getdents(r0, 0x0, 0x0) 18:09:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0xffffffff}, {}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$netlink(0x10, 0x3, 0x0) 18:09:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='fd\x00') getdents(r0, 0x0, 0x0) [ 195.198864][T11055] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 195.249722][T11067] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 18:09:58 executing program 4: mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x1) shmdt(0x0) 18:09:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0xffffffff}, {}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$netlink(0x10, 0x3, 0x0) 18:09:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0xffffffff}, {}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$netlink(0x10, 0x3, 0x0) 18:09:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x68, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x30, 0x2, [@m_ctinfo={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) 18:09:58 executing program 0: r0 = socket(0x2, 0x80805, 0x0) socket(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x76, &(0x7f0000000000)={r2}, 0x8) 18:09:58 executing program 3: close(0xffffffffffffffff) 18:09:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0xffffffff}, {}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$netlink(0x10, 0x3, 0x0) 18:09:58 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x40047438, 0x0) 18:09:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0xffffffff}, {}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$netlink(0x10, 0x3, 0x0) [ 195.399962][T11073] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 18:09:58 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x40047438, 0x0) 18:09:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0xffffffff}, {}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) socket$netlink(0x10, 0x3, 0x0) 18:09:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xe}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 195.455307][T11073] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 18:09:58 executing program 4: mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x1) shmdt(0x0) 18:09:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x68, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x30, 0x2, [@m_ctinfo={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) 18:09:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffff7, 0x10, &(0x7f0000000340), 0xfffffffffffffe19}, 0x42) 18:09:58 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1e, &(0x7f00000018c0), &(0x7f0000002f40)=0x10) 18:09:58 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x40047438, 0x0) 18:09:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xe}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xe}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffff7, 0x10, &(0x7f0000000340), 0xfffffffffffffe19}, 0x42) 18:09:58 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1e, &(0x7f00000018c0), &(0x7f0000002f40)=0x10) 18:09:58 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x40047438, 0x0) 18:09:58 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1e, &(0x7f00000018c0), &(0x7f0000002f40)=0x10) [ 195.697783][T11103] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 18:09:58 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f00000002c0), r0) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}}, 0x0) write$nci(r1, &(0x7f0000000200)=@NCI_OP_RF_INTF_ACTIVATED_NTF={0x1, 0x0, 0x3, 0x5, 0x0, @a={0x0, 0x3, 0x2c6584b37591a0bb, 0x0, 0x0, 0x1, 0x1, {0x0, 0x1, "15"}, 0x0, 0x0, 0x0, 0x0, 0xa, "a789d4841eb73adac5e0"}}, 0x1e) [ 195.762954][T11103] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 18:09:59 executing program 4: mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f00000f5000/0x4000)=nil, 0x6000) mlockall(0x1) shmdt(0x0) 18:09:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000b96871dfbfa30000000000001503000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000455781a5feee5e1ce784909b849d5550adf200000000000000b61d69f2ffdaa10350e11cb97c8ad51bcda0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0631f6dde53a9a53608c10556e5734eb84049761451ce2e2d9f8004e26f7fcc059c06220002595f6dba87b81d1106fb0289ce67a66afd9ac3d09e29679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1dcc4ff8546fee53f5b2e7b91c61ced1ebad000000000000e8122a793c080a882add4e1179bd4a44f231b6d753a78845d8363e0401861abebe428ba953df4aece69311687f4122073a236c3ad198e3f3a532efa04137d452ff47d2638da3261c8362bb7c7824be6195a66d2e17e122040e11e3bd4a69fc6e8d9f7043e09b9e10dc7777bfae5884e4ba1e9cc4a2bbe99e30816127f46a1aae33d4d63d716c0975e1ce4a655362e7062ff6ab3934555c01840219829472adefa06d3482c7b2711b98eabdca89b77efd13e6dba4a431ce47911834118093b6cabaa17a57727474e1785ee234835088445aa4a9b677d3d342640e328504aea02a2d727e62b7f097a02dbf8fe1d704765de7482040b2fc3000000000000000008947baeaaf954aff687deaa2f804924600273ee26d8115cbca081a14cba24788779291745083fccdddc90d7af35c528d46362ea0d8d79c79ddca066da478c197d4a550470557bc99cca336bd88cd28a5ee651627e3a6fbf6ea53b95ddb64c69c7d8d2f4baddc239828760459564124bad68209d2a1d16ad085886c017679cfcda8b1e152ac1e2bcc5ede5b5687aa418abfa29acd7339e73b2cd185c9eb5fb34fccd20ffa155b16c0c309ed6f6663677df37de0ec0d0f548b273940be5d1fe0bae14d1a76bf741330dacd9cc19c0163bcc93059e8d2d1bfa928e2ba458ecd989cb3581a3f270ad48255ac0dad4923e3e3160ccbb0a5e9587fb4f70236a483aeacbb3cf15601a4cb5007"], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffff7, 0x10, &(0x7f0000000340), 0xfffffffffffffe19}, 0x42) 18:09:59 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1e, &(0x7f00000018c0), &(0x7f0000002f40)=0x10) 18:09:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xe}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:09:59 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x72, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 18:09:59 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x41) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001100)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={r3, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e22, @loopback}, 0x28c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='rose0\x00', 0x1, 0x88, 0x2}) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000100)={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @multicast2}, 0xc) r4 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) socket$inet(0x2, 0x800, 0x0) getsockname$packet(r4, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001100)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}}, 0x0) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002cbd7000fbdbdf250100000006000a004e2400000800080064010101050004000000000008000600ac1414aa0500040002000000050002000a0000000500040004000000060001004e24000008000b002955ab9062dac554b05eb6b8a07809123af2225fa11c42d8873f04000000ff3fc2e88960e1557b", @ANYRES32=r7, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x42040040}, 0x8000) socket$inet_udp(0x2, 0x2, 0x0) 18:09:59 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x300000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 18:09:59 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x72, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 18:09:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffff7, 0x10, &(0x7f0000000340), 0xfffffffffffffe19}, 0x42) 18:09:59 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x72, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 18:09:59 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x72, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) [ 196.021475][T11138] bridge9: entered promiscuous mode [ 196.026802][T11138] bridge9: entered allmulticast mode [ 196.144698][T11149] bridge9: entered promiscuous mode [ 196.149952][T11149] bridge9: entered allmulticast mode [ 196.196618][T11138] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11138 comm=syz-executor.0 18:09:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f00000002c0), r0) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}}, 0x0) write$nci(r1, &(0x7f0000000200)=@NCI_OP_RF_INTF_ACTIVATED_NTF={0x1, 0x0, 0x3, 0x5, 0x0, @a={0x0, 0x3, 0x2c6584b37591a0bb, 0x0, 0x0, 0x1, 0x1, {0x0, 0x1, "15"}, 0x0, 0x0, 0x0, 0x0, 0xa, "a789d4841eb73adac5e0"}}, 0x1e) 18:09:59 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x300000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 18:09:59 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x72, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 18:09:59 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x72, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 18:09:59 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='>\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d050000000000000000020202000900010073797a3200008000140002"], 0x40}, 0x1, 0x40030000000000}, 0x0) 18:09:59 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x41) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001100)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={r3, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e22, @loopback}, 0x28c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='rose0\x00', 0x1, 0x88, 0x2}) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000100)={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @multicast2}, 0xc) r4 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) socket$inet(0x2, 0x800, 0x0) getsockname$packet(r4, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001100)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}}, 0x0) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002cbd7000fbdbdf250100000006000a004e2400000800080064010101050004000000000008000600ac1414aa0500040002000000050002000a0000000500040004000000060001004e24000008000b002955ab9062dac554b05eb6b8a07809123af2225fa11c42d8873f04000000ff3fc2e88960e1557b", @ANYRES32=r7, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x42040040}, 0x8000) socket$inet_udp(0x2, 0x2, 0x0) 18:09:59 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x41) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001100)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={r3, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e22, @loopback}, 0x28c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='rose0\x00', 0x1, 0x88, 0x2}) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000100)={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @multicast2}, 0xc) r4 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) socket$inet(0x2, 0x800, 0x0) getsockname$packet(r4, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001100)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}}, 0x0) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002cbd7000fbdbdf250100000006000a004e2400000800080064010101050004000000000008000600ac1414aa0500040002000000050002000a0000000500040004000000060001004e24000008000b002955ab9062dac554b05eb6b8a07809123af2225fa11c42d8873f04000000ff3fc2e88960e1557b", @ANYRES32=r7, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x42040040}, 0x8000) socket$inet_udp(0x2, 0x2, 0x0) 18:09:59 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x300000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 18:09:59 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x72, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 18:09:59 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x300000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 18:09:59 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x41) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001100)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={r3, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e22, @loopback}, 0x28c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='rose0\x00', 0x1, 0x88, 0x2}) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000100)={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @multicast2}, 0xc) r4 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) socket$inet(0x2, 0x800, 0x0) getsockname$packet(r4, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001100)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}}, 0x0) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002cbd7000fbdbdf250100000006000a004e2400000800080064010101050004000000000008000600ac1414aa0500040002000000050002000a0000000500040004000000060001004e24000008000b002955ab9062dac554b05eb6b8a07809123af2225fa11c42d8873f04000000ff3fc2e88960e1557b", @ANYRES32=r7, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x42040040}, 0x8000) socket$inet_udp(0x2, 0x2, 0x0) 18:09:59 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='>\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d050000000000000000020202000900010073797a3200008000140002"], 0x40}, 0x1, 0x40030000000000}, 0x0) [ 196.645304][T11162] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. [ 196.673774][T11163] bridge9: entered promiscuous mode [ 196.679035][T11163] bridge9: entered allmulticast mode [ 196.783380][T11176] bridge5: entered promiscuous mode [ 196.788764][T11176] bridge5: entered allmulticast mode [ 196.853747][T11180] bridge4: entered promiscuous mode [ 196.859035][T11180] bridge4: entered allmulticast mode [ 196.877921][T11177] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11177 comm=syz-executor.0 [ 196.921874][T11176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11176 comm=syz-executor.5 [ 196.944533][T11191] bridge9: entered promiscuous mode [ 196.949838][T11191] bridge9: entered allmulticast mode [ 196.962248][T11188] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11188 comm=syz-executor.1 [ 197.023693][T11195] bridge5: entered promiscuous mode [ 197.028923][T11195] bridge5: entered allmulticast mode [ 197.092493][T11198] bridge4: entered promiscuous mode [ 197.097736][T11198] bridge4: entered allmulticast mode 18:10:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioct