executing program 1: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000400)={[{@iocharset={'iocharset', 0x3d, 'cp775'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@utf8}, {@shortname_lower}, {@fat=@fmask={'fmask', 0x3d, 0x101}}, {@shortname_lower}, {@fat=@dmask={'dmask', 0x3d, 0x81}}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@numtail}, {@shortname_lower}, {@shortname_winnt}, {@fat=@uid={'uid', 0x3d, 0xee01}}, {@utf8no}, {@rodir}, {@utf8no}]}, 0xff, 0x210, &(0x7f0000000900)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) 15:40:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r1, &(0x7f0000001300)='o', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @private0}, 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x1) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 15:40:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r1, &(0x7f0000001300)='o', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @private0}, 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x1) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xe) 15:40:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000023c0)='net/raw\x00') socket$igmp(0x2, 0x3, 0x2) socket$igmp(0x2, 0x3, 0x2) socket$igmp(0x2, 0x3, 0x2) preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000000000)=""/4093, 0xffd}], 0x1, 0x300, 0x0) 15:40:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000400)={[{@iocharset={'iocharset', 0x3d, 'cp775'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@utf8}, {@shortname_lower}, {@fat=@fmask={'fmask', 0x3d, 0x101}}, {@shortname_lower}, {@fat=@dmask={'dmask', 0x3d, 0x81}}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@numtail}, {@shortname_lower}, {@shortname_winnt}, {@fat=@uid={'uid', 0x3d, 0xee01}}, {@utf8no}, {@rodir}, {@utf8no}]}, 0xff, 0x210, &(0x7f0000000900)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) 15:40:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000400)={[{@iocharset={'iocharset', 0x3d, 'cp775'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@utf8}, {@shortname_lower}, {@fat=@fmask={'fmask', 0x3d, 0x101}}, {@shortname_lower}, {@fat=@dmask={'dmask', 0x3d, 0x81}}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@numtail}, {@shortname_lower}, {@shortname_winnt}, {@fat=@uid={'uid', 0x3d, 0xee01}}, {@utf8no}, {@rodir}, {@utf8no}]}, 0xff, 0x210, &(0x7f0000000900)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) 15:40:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x437, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_PDP_HASHSIZE={0x8, 0x3, 0x1}]}}}}]}, 0x48}}, 0x0) 15:40:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24}, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8}, {0x4}}}]}, 0x30}}, 0x0) 15:40:27 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = epoll_create(0x6) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x4, 0x0, 0x0) 15:40:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x0, 0xa}, 0xe) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffff}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) r2 = dup(r0) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x401, 0x0, 0x1f, 0x0, 0x3, 0x200, 0x8000, r1}, 0x20) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x14, &(0x7f00000001c0)={r6}, 0x8) 15:40:27 executing program 3: unshare(0x40480) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r0 = socket(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) gettid() 15:40:27 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = epoll_create(0x6) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x4, 0x0, 0x0) 15:40:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24}, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8}, {0x4}}}]}, 0x30}}, 0x0) 15:40:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24}, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8}, {0x4}}}]}, 0x30}}, 0x0) 15:40:27 executing program 3: unshare(0x40480) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r0 = socket(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) gettid() 15:40:27 executing program 1: unshare(0x40480) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r0 = socket(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) gettid() 15:40:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x437, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_PDP_HASHSIZE={0x8, 0x3, 0x1}]}}}}]}, 0x48}}, 0x0) 15:40:27 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = epoll_create(0x6) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x4, 0x0, 0x0) 15:40:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24}, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8}, {0x4}}}]}, 0x30}}, 0x0) [ 214.490867][ T23] audit: type=1400 audit(1681918827.802:582): avc: denied { bind } for pid=11669 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 214.510663][ T23] audit: type=1400 audit(1681918827.802:583): avc: denied { node_bind } for pid=11669 comm="syz-executor.3" saddr=fe88::4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 15:40:27 executing program 3: unshare(0x40480) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r0 = socket(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) gettid() 15:40:27 executing program 4: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = epoll_create(0x6) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x4, 0x0, 0x0) 15:40:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24}, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8}, {0x4}}}]}, 0x30}}, 0x0) 15:40:27 executing program 3: unshare(0x40480) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r0 = socket(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) gettid() 15:40:27 executing program 1: unshare(0x40480) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r0 = socket(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) gettid() 15:40:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x437, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_PDP_HASHSIZE={0x8, 0x3, 0x1}]}}}}]}, 0x48}}, 0x0) 15:40:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24}, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8}, {0x4}}}]}, 0x30}}, 0x0) 15:40:27 executing program 1: unshare(0x40480) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r0 = socket(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) gettid() 15:40:27 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = epoll_create(0x6) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x4, 0x0, 0x0) 15:40:27 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x437, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_PDP_HASHSIZE={0x8, 0x3, 0x1}]}}}}]}, 0x48}}, 0x0) 15:40:27 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x4000000) 15:40:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24}, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8}, {0x4}}}]}, 0x30}}, 0x0) 15:40:27 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00000014c0)={@broadcast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast, @private=0xa010101, @multicast, @remote}}}}, 0x0) 15:40:27 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x4000000) 15:40:28 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = epoll_create(0x6) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x4, 0x0, 0x0) 15:40:28 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00000014c0)={@broadcast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast, @private=0xa010101, @multicast, @remote}}}}, 0x0) 15:40:28 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x4000000) 15:40:28 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) r0 = epoll_create(0x6) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x4, 0x0, 0x0) 15:40:28 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00000014c0)={@broadcast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast, @private=0xa010101, @multicast, @remote}}}}, 0x0) 15:40:28 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00000014c0)={@broadcast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast, @private=0xa010101, @multicast, @remote}}}}, 0x0) 15:40:28 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x4000000) 15:40:28 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 3: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x77359400}}, 0x0) 15:40:28 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x283, @time}) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x149a42, 0x0) dup3(r1, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000040)={{0x2}}) tkill(r0, 0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000240)={0x0, 0x0, 0x0, 'queue1\x00'}) 15:40:28 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 3: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x77359400}}, 0x0) 15:40:28 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000000000000000000000bd000000000000000000000000ed0100000000400000000000000000000000000000000000000000090000000000000000000000000000000200000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[], 0x310) 15:40:28 executing program 5: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x77359400}}, 0x0) 15:40:28 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x0, r2}, 0x10) 15:40:28 executing program 1: r0 = socket(0x29, 0x2, 0x0) ioctl$SIOCGETVIFCNT(r0, 0x89e0, &(0x7f0000000000)) 15:40:28 executing program 5: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x77359400}}, 0x0) [ 214.797133][ T23] audit: type=1400 audit(1681918828.112:584): avc: denied { wake_alarm } for pid=11747 comm="syz-executor.3" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 15:40:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) write(r0, &(0x7f0000000180)="2400000052001f0014f9f407000904000a00071010000100feffffff0800000000000000", 0x24) 15:40:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r0, &(0x7f0000000040)="ac", 0x1, 0x0, &(0x7f0000000380)={0xa, 0x0, 0x0, @private2}, 0x1c) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000011c0)="a0", 0x1, 0x0, &(0x7f00000012c0)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 15:40:28 executing program 3: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x77359400}}, 0x0) 15:40:28 executing program 1: r0 = socket(0x29, 0x2, 0x0) ioctl$SIOCGETVIFCNT(r0, 0x89e0, &(0x7f0000000000)) 15:40:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) write(r0, &(0x7f0000000180)="2400000052001f0014f9f407000904000a00071010000100feffffff0800000000000000", 0x24) 15:40:28 executing program 1: r0 = socket(0x29, 0x2, 0x0) ioctl$SIOCGETVIFCNT(r0, 0x89e0, &(0x7f0000000000)) 15:40:28 executing program 3: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x77359400}}, 0x0) 15:40:28 executing program 5: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x77359400}}, 0x0) 15:40:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}, @enum]}}, &(0x7f0000000540)=""/182, 0x3e, 0xb6, 0x1}, 0x20) 15:40:28 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x0, r2}, 0x10) 15:40:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) write(r0, &(0x7f0000000180)="2400000052001f0014f9f407000904000a00071010000100feffffff0800000000000000", 0x24) 15:40:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r0, &(0x7f0000000040)="ac", 0x1, 0x0, &(0x7f0000000380)={0xa, 0x0, 0x0, @private2}, 0x1c) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000011c0)="a0", 0x1, 0x0, &(0x7f00000012c0)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 15:40:28 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) 15:40:28 executing program 1: r0 = socket(0x29, 0x2, 0x0) ioctl$SIOCGETVIFCNT(r0, 0x89e0, &(0x7f0000000000)) 15:40:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}, @enum]}}, &(0x7f0000000540)=""/182, 0x3e, 0xb6, 0x1}, 0x20) 15:40:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_delroute={0x20, 0x19, 0x1, 0x0, 0x0, {0x2, 0x80}, [@RTA_METRICS={0xfffffd2f}]}, 0x20}}, 0x0) 15:40:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}, @enum]}}, &(0x7f0000000540)=""/182, 0x3e, 0xb6, 0x1}, 0x20) 15:40:28 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x0, r2}, 0x10) 15:40:28 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) 15:40:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x3c33) write(r0, &(0x7f0000000180)="2400000052001f0014f9f407000904000a00071010000100feffffff0800000000000000", 0x24) 15:40:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r0, &(0x7f0000000040)="ac", 0x1, 0x0, &(0x7f0000000380)={0xa, 0x0, 0x0, @private2}, 0x1c) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000011c0)="a0", 0x1, 0x0, &(0x7f00000012c0)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 15:40:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}, @enum]}}, &(0x7f0000000540)=""/182, 0x3e, 0xb6, 0x1}, 0x20) 15:40:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_delroute={0x20, 0x19, 0x1, 0x0, 0x0, {0x2, 0x80}, [@RTA_METRICS={0xfffffd2f}]}, 0x20}}, 0x0) 15:40:28 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) [ 214.969719][ T23] audit: type=1400 audit(1681918828.282:585): avc: denied { bind } for pid=11797 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 215.000946][T11806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 15:40:28 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) 15:40:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) 15:40:28 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x0, r2}, 0x10) 15:40:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_delroute={0x20, 0x19, 0x1, 0x0, 0x0, {0x2, 0x80}, [@RTA_METRICS={0xfffffd2f}]}, 0x20}}, 0x0) 15:40:28 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) 15:40:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) [ 215.074522][T11820] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 215.091265][ T23] audit: type=1400 audit(1681918828.402:586): avc: denied { setopt } for pid=11825 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 215.099685][T11834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 15:40:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r0, &(0x7f0000000040)="ac", 0x1, 0x0, &(0x7f0000000380)={0xa, 0x0, 0x0, @private2}, 0x1c) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000011c0)="a0", 0x1, 0x0, &(0x7f00000012c0)={0xa, 0x0, 0x0, @private0}, 0x1c) shutdown(r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 15:40:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) 15:40:28 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@ipv4_delroute={0x20, 0x19, 0x1, 0x0, 0x0, {0x2, 0x80}, [@RTA_METRICS={0xfffffd2f}]}, 0x20}}, 0x0) 15:40:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x2, 0x0, 0x1}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000300)=@udp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0}, 0x20) 15:40:28 executing program 4: syslog(0x4, &(0x7f00000001c0), 0x0) 15:40:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) [ 215.197911][T11855] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 15:40:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000004c0)=""/262, 0x26, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x42}, 0x48) 15:40:28 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x2, 0x0, 0x1}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000300)=@udp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0}, 0x20) 15:40:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x2, 0x0, 0x1}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000300)=@udp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0}, 0x20) 15:40:28 executing program 4: syslog(0x4, &(0x7f00000001c0), 0x0) 15:40:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000004c0)=""/262, 0x26, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x42}, 0x48) 15:40:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2c, 0x1, 0x0) getsockopt(r2, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x2, 0x40, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xc}, 0x48) r6 = socket(0x40000000015, 0x805, 0x0) getsockopt(r6, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r5, &(0x7f0000000140)="9b01c0121df5e6f9d98a46aa909f29f48fcc05637bed58080ab313040b410fd4f8ed33d58ec3ada891e659774aefb599af9da8e7b9a18b589ec358c384f167ce7e6f63d4cf0a12c944ec80588172c24cd5b1c784f4ed48615501769906dbb119572c0876db4855a83a3763916e803d4d5bae709151fc9ece648a8ae3a54c1a749da500e3ae953d9bbdb4f729291ac9c2abeaa1aa83cc53ba43a8e2a468def64b201c6d55c611dd907ed693aef732d9a86aa31cd6c3a2846168fa3051ebb212746b6544d14f95c3500490aafe7a9cc50ca998829219a3bf440edb629ae2", &(0x7f0000000040)=@tcp=r6, 0x2}, 0x20) r7 = socket(0x40000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) setsockopt$inet6_group_source_req(r7, 0x29, 0x2f, &(0x7f0000000280)={0x212b, {{0xa, 0x4e23, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e20, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80}}}, 0x108) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x44}, 0x0, r4}) 15:40:28 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x2, 0x0, 0x1}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000300)=@udp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0}, 0x20) 15:40:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000000)=""/154, 0x9a, 0x48) 15:40:28 executing program 4: syslog(0x4, &(0x7f00000001c0), 0x0) 15:40:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000004c0)=""/262, 0x26, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x42}, 0x48) 15:40:28 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x2, 0x0, 0x1}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000300)=@udp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0}, 0x20) 15:40:28 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x2, 0x0, 0x1}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000300)=@udp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0}, 0x20) 15:40:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000080)="71641907", 0x4}], 0x1) 15:40:28 executing program 1: syz_read_part_table(0x1054, &(0x7f0000001100)="$eJzsz7GtwjAUBdBrR9FPfgEFC7ADs7AGJS1UDMNUFMxAGxRCYAKEkM4p7Hft27zwVeuamuZ/tU8/xn7x+rnuprtLfdeXSe2TIeUyP7VDOU5TMx6PcnPbdKe5UGspyWFO7XP4S7I9f3A1AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZ9wAAAP///6MJBw==") 15:40:28 executing program 4: syslog(0x4, &(0x7f00000001c0), 0x0) 15:40:28 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x2, 0x0, 0x1}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000300)=@udp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0}, 0x20) 15:40:28 executing program 2: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000002180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) 15:40:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000004c0)=""/262, 0x26, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x42}, 0x48) 15:40:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000080)="71641907", 0x4}], 0x1) 15:40:28 executing program 2: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000002180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) 15:40:28 executing program 4: rseq(&(0x7f0000001400), 0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 15:40:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 15:40:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000080)="71641907", 0x4}], 0x1) 15:40:28 executing program 2: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000002180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) 15:40:28 executing program 1: syz_read_part_table(0x1054, &(0x7f0000001100)="$eJzsz7GtwjAUBdBrR9FPfgEFC7ADs7AGJS1UDMNUFMxAGxRCYAKEkM4p7Hft27zwVeuamuZ/tU8/xn7x+rnuprtLfdeXSe2TIeUyP7VDOU5TMx6PcnPbdKe5UGspyWFO7XP4S7I9f3A1AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZ9wAAAP///6MJBw==") 15:40:28 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0) 15:40:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000080)="71641907", 0x4}], 0x1) 15:40:28 executing program 2: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000002180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) 15:40:28 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0) 15:40:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:28 executing program 4: rseq(&(0x7f0000001400), 0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 15:40:28 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0) 15:40:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:28 executing program 1: syz_read_part_table(0x1054, &(0x7f0000001100)="$eJzsz7GtwjAUBdBrR9FPfgEFC7ADs7AGJS1UDMNUFMxAGxRCYAKEkM4p7Hft27zwVeuamuZ/tU8/xn7x+rnuprtLfdeXSe2TIeUyP7VDOU5TMx6PcnPbdKe5UGspyWFO7XP4S7I9f3A1AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZ9wAAAP///6MJBw==") 15:40:28 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0) 15:40:28 executing program 3: rseq(&(0x7f0000001400), 0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 15:40:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$eJzs3VFrW28ZAPDnpM3sts526sUcbA436YYuaVe3FS+2CeLdQJn3s7RpKU2b0qTbWoZ0+AEEER145ZU3gh9AkH0EEQZ6LyqK6KYXXqhHzsnp1oVk7fi3zUh/P3hz3nOSc57nTZqT857zNgng2LoUEfciYigirkXEWLG8VJTYbpfsca9fPZ3LShJp+uDvSSTFsp1tJcX0dLHaSHvSVXNza3m2Xq+tF/PV1spatbm5dX1pZXaxtlhbnZ6eujVze+bmzOSBtDNr151v/PnHP/j5N+/8+iuP//Dwr1e/l+U7Wty/ux0Hqf2clLPn4o3hiFg/jGB9MFS0p9zvRAAA2Jfs+O0zEfHF/Ph/LIbyo7mcQzoAAAAYEOnd0fhPEpECAAAAA+tuPgY2KVWK8b6jUSpVKu0xvJ+LU6V6o9n68kJjY3W+PVZ2PMqlhaV6bbIYUzse5SSbn8rrb+dvdMxPR8TZiPjR2Ml8vjLXqM/3++QHAAAAHBOnO/r//xpr9/8BAACAATPe7wQAAACAQ6f/DwAAAINP/x8AAAAG2rfu389KuvP71/OPNjeWG4+uz9eay5WVjbnKXGN9rbLYaCzm39m3stf26o3G2ldjdeNJtVVrtqrNza2HK42N1dbDpXd+AhsAAAA4Qme/8OL3SURsf+1kXjInspuhHisYKwADo/QhD/7T4eUBHL1eH/PA4BvudwJA35T7nQDQd8ke9/ccvPObg88FAAA4HBOf7379f9i5ARh4H3T9Hxgorv/D8eX6PxxfZUcAcOwd/vX/NN1zWwAAwKEazUtSqhTXAkejVKpUIs7k/+pfThaW6rXJiPh0RPxurPypbH4qXzPZs88AAAAAAAAAAAAAAAAAAAAAAAAAALSlaRIpAAAAMNAiSn9Jit//mhi7Mtp5fuBE8u+xfBoRj3/64CdPZlut9als+T/eLG89L5bf6McZDAAAAKDTTj99px8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfp9aunczvlKOP+7esRMd4t/nCM5NORKEfEqX8mMbxrvSQihg4g/vaziDjXLX6SpRXjRRad8UsRcfJo4l9I07Rr/NMHEB+OsxfZ/udet/dfKS7l0+7v/+GifFK993+lN/u/oR77vzP7jHH+5S+rPeM/izg/3H3/sxM/6RH/crcNdnlSvvudra1e8dOfRUx0/fxJ3olVba2sVZubW9eXVmYXa4u11enpqVszt2duzkxWF5bqteK2a4wfXvjV/zoW/Tdty9sfPeKP79H+K1ml3Ktlu4K9fPLqs+1quWMTefyrl7u//ufeEz/7m/hS8TmQ3T+xU99u13e7+IvfXuyVWxZ/vkf793r9r+7d9Ny1b3//j/t8KABwBJqbW8uz9Xpt/dArz9M0PapYKh9hZeTjSENlf5V+75kAAICD9vagv9+ZAAAAAAAAAAAAAAAAAAAAwPF1FF8n1hlzuz9NBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4r/8HAAD//64q4Yw=") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 4: rseq(&(0x7f0000001400), 0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 15:40:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 1: syz_read_part_table(0x1054, &(0x7f0000001100)="$eJzsz7GtwjAUBdBrR9FPfgEFC7ADs7AGJS1UDMNUFMxAGxRCYAKEkM4p7Hft27zwVeuamuZ/tU8/xn7x+rnuprtLfdeXSe2TIeUyP7VDOU5TMx6PcnPbdKe5UGspyWFO7XP4S7I9f3A1AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZ9wAAAP///6MJBw==") 15:40:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$eJzs3VFrW28ZAPDnpM3sts526sUcbA436YYuaVe3FS+2CeLdQJn3s7RpKU2b0qTbWoZ0+AEEER145ZU3gh9AkH0EEQZ6LyqK6KYXXqhHzsnp1oVk7fi3zUh/P3hz3nOSc57nTZqT857zNgng2LoUEfciYigirkXEWLG8VJTYbpfsca9fPZ3LShJp+uDvSSTFsp1tJcX0dLHaSHvSVXNza3m2Xq+tF/PV1spatbm5dX1pZXaxtlhbnZ6eujVze+bmzOSBtDNr151v/PnHP/j5N+/8+iuP//Dwr1e/l+U7Wty/ux0Hqf2clLPn4o3hiFg/jGB9MFS0p9zvRAAA2Jfs+O0zEfHF/Ph/LIbyo7mcQzoAAAAYEOnd0fhPEpECAAAAA+tuPgY2KVWK8b6jUSpVKu0xvJ+LU6V6o9n68kJjY3W+PVZ2PMqlhaV6bbIYUzse5SSbn8rrb+dvdMxPR8TZiPjR2Ml8vjLXqM/3++QHAAAAHBOnO/r//xpr9/8BAACAATPe7wQAAACAQ6f/DwAAAINP/x8AAAAG2rfu389KuvP71/OPNjeWG4+uz9eay5WVjbnKXGN9rbLYaCzm39m3stf26o3G2ldjdeNJtVVrtqrNza2HK42N1dbDpXd+AhsAAAA4Qme/8OL3SURsf+1kXjInspuhHisYKwADo/QhD/7T4eUBHL1eH/PA4BvudwJA35T7nQDQd8ke9/ccvPObg88FAAA4HBOf7379f9i5ARh4H3T9Hxgorv/D8eX6PxxfZUcAcOwd/vX/NN1zWwAAwKEazUtSqhTXAkejVKpUIs7k/+pfThaW6rXJiPh0RPxurPypbH4qXzPZs88AAAAAAAAAAAAAAAAAAAAAAAAAALSlaRIpAAAAMNAiSn9Jit//mhi7Mtp5fuBE8u+xfBoRj3/64CdPZlut9als+T/eLG89L5bf6McZDAAAAKDTTj99px8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfp9aunczvlKOP+7esRMd4t/nCM5NORKEfEqX8mMbxrvSQihg4g/vaziDjXLX6SpRXjRRad8UsRcfJo4l9I07Rr/NMHEB+OsxfZ/udet/dfKS7l0+7v/+GifFK993+lN/u/oR77vzP7jHH+5S+rPeM/izg/3H3/sxM/6RH/crcNdnlSvvudra1e8dOfRUx0/fxJ3olVba2sVZubW9eXVmYXa4u11enpqVszt2duzkxWF5bqteK2a4wfXvjV/zoW/Tdty9sfPeKP79H+K1ml3Ktlu4K9fPLqs+1quWMTefyrl7u//ufeEz/7m/hS8TmQ3T+xU99u13e7+IvfXuyVWxZ/vkf793r9r+7d9Ny1b3//j/t8KABwBJqbW8uz9Xpt/dArz9M0PapYKh9hZeTjSENlf5V+75kAAICD9vagv9+ZAAAAAAAAAAAAAAAAAAAAwPF1FF8n1hlzuz9NBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4r/8HAAD//64q4Yw=") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$eJzs3VFrW28ZAPDnpM3sts526sUcbA436YYuaVe3FS+2CeLdQJn3s7RpKU2b0qTbWoZ0+AEEER145ZU3gh9AkH0EEQZ6LyqK6KYXXqhHzsnp1oVk7fi3zUh/P3hz3nOSc57nTZqT857zNgng2LoUEfciYigirkXEWLG8VJTYbpfsca9fPZ3LShJp+uDvSSTFsp1tJcX0dLHaSHvSVXNza3m2Xq+tF/PV1spatbm5dX1pZXaxtlhbnZ6eujVze+bmzOSBtDNr151v/PnHP/j5N+/8+iuP//Dwr1e/l+U7Wty/ux0Hqf2clLPn4o3hiFg/jGB9MFS0p9zvRAAA2Jfs+O0zEfHF/Ph/LIbyo7mcQzoAAAAYEOnd0fhPEpECAAAAA+tuPgY2KVWK8b6jUSpVKu0xvJ+LU6V6o9n68kJjY3W+PVZ2PMqlhaV6bbIYUzse5SSbn8rrb+dvdMxPR8TZiPjR2Ml8vjLXqM/3++QHAAAAHBOnO/r//xpr9/8BAACAATPe7wQAAACAQ6f/DwAAAINP/x8AAAAG2rfu389KuvP71/OPNjeWG4+uz9eay5WVjbnKXGN9rbLYaCzm39m3stf26o3G2ldjdeNJtVVrtqrNza2HK42N1dbDpXd+AhsAAAA4Qme/8OL3SURsf+1kXjInspuhHisYKwADo/QhD/7T4eUBHL1eH/PA4BvudwJA35T7nQDQd8ke9/ccvPObg88FAAA4HBOf7379f9i5ARh4H3T9Hxgorv/D8eX6PxxfZUcAcOwd/vX/NN1zWwAAwKEazUtSqhTXAkejVKpUIs7k/+pfThaW6rXJiPh0RPxurPypbH4qXzPZs88AAAAAAAAAAAAAAAAAAAAAAAAAALSlaRIpAAAAMNAiSn9Jit//mhi7Mtp5fuBE8u+xfBoRj3/64CdPZlut9als+T/eLG89L5bf6McZDAAAAKDTTj99px8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfp9aunczvlKOP+7esRMd4t/nCM5NORKEfEqX8mMbxrvSQihg4g/vaziDjXLX6SpRXjRRad8UsRcfJo4l9I07Rr/NMHEB+OsxfZ/udet/dfKS7l0+7v/+GifFK993+lN/u/oR77vzP7jHH+5S+rPeM/izg/3H3/sxM/6RH/crcNdnlSvvudra1e8dOfRUx0/fxJ3olVba2sVZubW9eXVmYXa4u11enpqVszt2duzkxWF5bqteK2a4wfXvjV/zoW/Tdty9sfPeKP79H+K1ml3Ktlu4K9fPLqs+1quWMTefyrl7u//ufeEz/7m/hS8TmQ3T+xU99u13e7+IvfXuyVWxZ/vkf793r9r+7d9Ny1b3//j/t8KABwBJqbW8uz9Xpt/dArz9M0PapYKh9hZeTjSENlf5V+75kAAICD9vagv9+ZAAAAAAAAAAAAAAAAAAAAwPF1FF8n1hlzuz9NBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4r/8HAAD//64q4Yw=") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 3: rseq(&(0x7f0000001400), 0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 15:40:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 4: rseq(&(0x7f0000001400), 0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 15:40:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) 15:40:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f00000005c0), 0x1, 0x530, &(0x7f0000000600)="$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") 15:40:29 executing program 3: rseq(&(0x7f0000001400), 0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 15:40:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000008140)={0x0, 0x0, &(0x7f00000080c0)=[{&(0x7f0000001900)={0x110, 0x4f, 0xffffffffffffffff, 0x0, 0x0, "", [@nested={0x100, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x61, 0x0, 0x0, 0x0, @binary="c743d6f0d0a4e8ceb04232c071ae51813fadba095eb5506e51fd82c14a5e596d104c58793ca56ec9dcd9eef50715b800e9838c2660944c254433d0053ca8b08255b638fb78890645b5bdb017e0f6fffdde71548c45fb31b76952263aa6"}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="0e80c36ecccdf92df225d789d68dda46354f7b6764cff45a1db53308797a4ad2d588305419a1ddef4b66f3199dc1324a5a6ea662e19f9b73a3e0ea06b68c048ea7dde79ab8fe8f719188b684df68064e3088a7836a08ed02ad422ada20d808b95ffb1b2745f526ee6bfce7fce0cbf63f275a5a2226ef8ac940f142824ae6f565"]}]}, 0x110}], 0x1}, 0x0) 15:40:29 executing program 2: setuid(0xee00) clock_adjtime(0x0, &(0x7f00000000c0)={0x8001}) 15:40:29 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) 15:40:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) mount(&(0x7f0000000100)=@sg0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x2001800, &(0x7f0000000200)='\x00') stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES16=r9, @ANYRES16=r9], 0x1, 0x4d0, &(0x7f0000000a40)="$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") getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000000a00)=0xe8) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pidfd_open(r11, 0x0) r12 = syz_clone(0x2000000, &(0x7f0000000a40)="2c2108ef4dbe046a7b73889b3e94a98736f9e94a4f24c80c18c65d5bae1dc5c823edb4b29690f61c4349db9e70c9941ede40523319e9b3ce52530c463da558b8640f", 0x42, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="cc95841887699930fd4972d6a10d6cc4194f7b1ffcbc2270d807354d75fb0445b5934698e886f9687d54a67800b9ec70ae14e7eea5939b8d5c74835eeb9ac21caf8e87d41bb9d2d91fc4a1b4aa96c3f630cd31c6dcc3fdacff116421bb9a5bdf9eabfb77dc16725b0dd889a21190c43f29cbd4981908b14d40cef7d04651937abd387c173c29b93715ab621dcb91356fdd951e64be2143e6b6d2583d2ef51431f5f3c40bd03a1e953707967fa79bc40ad35713cbe74a04f6c7715e48a0898e499c02b21bfd57c89247ae25290233eed46bdae36fa7db2e9a6053a1bdb3431024") r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)='pids.max\x00', 0x2, 0x0) r14 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r15}}, 0x48) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x18, 0x8, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xa}, @alu={0x7, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffffe0, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000cc0)='syzkaller\x00', 0x2, 0xce, &(0x7f0000000d00)=""/206, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x9, 0x9, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) r17 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000f40), 0x105981, 0x0) r18 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000fc0)={0x3, &(0x7f0000000f80)=[{0x9, 0xce, 0x7, 0xff}, {0x3b, 0xe3, 0x80, 0x3ffc0000}, {0x7f, 0x8, 0x9, 0x8001}]}) r19 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r19, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r20}}, 0x48) getresuid(&(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)=0x0) r22 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="fedb830cae45ccb3f6e91b22d471b51cd30913b5dd347282cab79e61a73ee8c37893334e8b01694a15d16e092c73708934d75df29a2a6729d712bfc2b4821590d89a99a2eb69dc37854f82c3eec36257ea42c3a4fdfb789b94b6887081b0b8082deb88ae452cdf7cb952f15c7633a69c42c50a8fa2710bab01b8ac586d79f5ae3dcd0dae25014d5618697b462070e4bd0b8fd20d5bc7bcb6adc68308e0b109dd20671c899898fefdc83de79cb65650593cf4", 0xb2}, {&(0x7f0000000440)="7bafccc18ab48a0577c59edfd669ba86c43fda41e5d8d4f043210a897940ae687a7700a2c15db01fee71478d", 0x2c}], 0x2, 0x0, 0x0, 0x8044}}, {{&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000540)}, {&(0x7f0000000580)="495476abec764063d41acedda7acaddd3add009de30b623089401cc3f128698325c0bbe68387c3655593b4fbcabf0d0745829f83db3d61a2", 0x38}, {&(0x7f00000005c0)="833948a7384c18f075611a6c17d5e8bdcd698e7e5ce96ef9a3d8d5de88804908268cd04641b6d7dbeb2dd4912f495f81143a58978b19f4d6d61c6af9af7d579dbdd330064433f75cea7599606d0ab840273abc6dee88bf6c59667a48178bcc18c3c09e8721741c80190339539b6f55757eb6a2066e97ea2fb4cd546f67946825bb74c6fa0c309e6126b6d0157534df4532ccd15aa9c88d42a237ae8c25f49740f186165e8ca6df281e7005bba52227c59b6986ab4dd681b6d124367b231a7312b32e438fe9c9764168ff40a2f2ca89174427c0264b638c7a767cbb166ac1e851a6de14ed15c52e855122a70fbe7b", 0xee}, {&(0x7f00000006c0)="b715574fa9e7362ed03ac1604d7ba30d397a0677f53bcb89d5272d1df5ab320ed6a255bcb450b80ce002204cac076922dae573ac0ee7497cb0871aab3b773223496142fb5e89e1efa10b0904b213162075e2977f4f91870925a76b62fa92290bc700a477cd68ceb9dc10c3c896e2cbffeaee3f837f615905fc52e4254e101c9a87af62ea795e5e43bd0034cc36040bfdef3753be76c5d5b76312804ee34dbb1618ebf9a0a872646bb5594220213698f28a3a4b4f57055b4f505cb0d97b0c01bb37a686434ab16efb2bcccd785ccfed48a34937b42bf6e8d25bbccf7a21e2b1fa50e599df43056b6c242cbb51bf8c13ccce2d38ece94263e4", 0xf8}], 0x4, &(0x7f0000001000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r1, r10, r7}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r6, r3}}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r12, r6, r7}}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r16, r17, r18]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r19]}}], 0x138, 0x401c0d0}}, {{&(0x7f0000001140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000011c0)="6311caa42e5cd75a3bb6dd9b", 0xc}, {&(0x7f0000001200)="4734957a28d26b9b6804908f209858178913b537be6f4f", 0x17}, {&(0x7f0000001240)}, {&(0x7f00000012c0)="e9838ecde1da15f8c945745e766eff82861f8f52f48d588beb7731c4a823809871f1310cbb4ee17b", 0x28}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {r1, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x50, 0x4000000}}], 0x3, 0x48041) [ 216.044188][T12046] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.1'. 15:40:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000008140)={0x0, 0x0, &(0x7f00000080c0)=[{&(0x7f0000001900)={0x110, 0x4f, 0xffffffffffffffff, 0x0, 0x0, "", [@nested={0x100, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x61, 0x0, 0x0, 0x0, @binary="c743d6f0d0a4e8ceb04232c071ae51813fadba095eb5506e51fd82c14a5e596d104c58793ca56ec9dcd9eef50715b800e9838c2660944c254433d0053ca8b08255b638fb78890645b5bdb017e0f6fffdde71548c45fb31b76952263aa6"}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="0e80c36ecccdf92df225d789d68dda46354f7b6764cff45a1db53308797a4ad2d588305419a1ddef4b66f3199dc1324a5a6ea662e19f9b73a3e0ea06b68c048ea7dde79ab8fe8f719188b684df68064e3088a7836a08ed02ad422ada20d808b95ffb1b2745f526ee6bfce7fce0cbf63f275a5a2226ef8ac940f142824ae6f565"]}]}, 0x110}], 0x1}, 0x0) 15:40:29 executing program 2: setuid(0xee00) clock_adjtime(0x0, &(0x7f00000000c0)={0x8001}) 15:40:29 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) 15:40:29 executing program 0: setreuid(0x0, 0xee00) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x4, 0x1, 0xfffffffd}, 0x48) 15:40:29 executing program 2: setuid(0xee00) clock_adjtime(0x0, &(0x7f00000000c0)={0x8001}) 15:40:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000008140)={0x0, 0x0, &(0x7f00000080c0)=[{&(0x7f0000001900)={0x110, 0x4f, 0xffffffffffffffff, 0x0, 0x0, "", [@nested={0x100, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x61, 0x0, 0x0, 0x0, @binary="c743d6f0d0a4e8ceb04232c071ae51813fadba095eb5506e51fd82c14a5e596d104c58793ca56ec9dcd9eef50715b800e9838c2660944c254433d0053ca8b08255b638fb78890645b5bdb017e0f6fffdde71548c45fb31b76952263aa6"}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="0e80c36ecccdf92df225d789d68dda46354f7b6764cff45a1db53308797a4ad2d588305419a1ddef4b66f3199dc1324a5a6ea662e19f9b73a3e0ea06b68c048ea7dde79ab8fe8f719188b684df68064e3088a7836a08ed02ad422ada20d808b95ffb1b2745f526ee6bfce7fce0cbf63f275a5a2226ef8ac940f142824ae6f565"]}]}, 0x110}], 0x1}, 0x0) 15:40:29 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) [ 216.083452][ T23] audit: type=1400 audit(1681918829.392:587): avc: denied { setopt } for pid=12055 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 216.117696][T12063] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.1'. 15:40:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000008140)={0x0, 0x0, &(0x7f00000080c0)=[{&(0x7f0000001900)={0x110, 0x4f, 0xffffffffffffffff, 0x0, 0x0, "", [@nested={0x100, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x61, 0x0, 0x0, 0x0, @binary="c743d6f0d0a4e8ceb04232c071ae51813fadba095eb5506e51fd82c14a5e596d104c58793ca56ec9dcd9eef50715b800e9838c2660944c254433d0053ca8b08255b638fb78890645b5bdb017e0f6fffdde71548c45fb31b76952263aa6"}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="0e80c36ecccdf92df225d789d68dda46354f7b6764cff45a1db53308797a4ad2d588305419a1ddef4b66f3199dc1324a5a6ea662e19f9b73a3e0ea06b68c048ea7dde79ab8fe8f719188b684df68064e3088a7836a08ed02ad422ada20d808b95ffb1b2745f526ee6bfce7fce0cbf63f275a5a2226ef8ac940f142824ae6f565"]}]}, 0x110}], 0x1}, 0x0) 15:40:29 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) 15:40:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x16, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @private0}}}, 0x90) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x16, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x90) 15:40:29 executing program 0: setreuid(0x0, 0xee00) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x4, 0x1, 0xfffffffd}, 0x48) 15:40:29 executing program 2: setuid(0xee00) clock_adjtime(0x0, &(0x7f00000000c0)={0x8001}) 15:40:29 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) flock(0xffffffffffffffff, 0x5) 15:40:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x16, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @private0}}}, 0x90) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x16, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x90) 15:40:29 executing program 0: setreuid(0x0, 0xee00) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x4, 0x1, 0xfffffffd}, 0x48) [ 216.177421][T12071] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.1'. 15:40:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x9007}, 0x4) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) 15:40:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:29 executing program 0: setreuid(0x0, 0xee00) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x4, 0x1, 0xfffffffd}, 0x48) 15:40:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x16, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @private0}}}, 0x90) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x16, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x90) 15:40:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x9007}, 0x4) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) 15:40:29 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) flock(0xffffffffffffffff, 0x5) 15:40:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) flock(0xffffffffffffffff, 0x5) [ 216.246822][T12084] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.1'. 15:40:29 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) unshare(0x4000400) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, 0x0) 15:40:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x16, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @private0}}}, 0x90) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x16, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x90) 15:40:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x9007}, 0x4) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) 15:40:29 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) flock(0xffffffffffffffff, 0x5) 15:40:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) flock(0xffffffffffffffff, 0x5) 15:40:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) [ 216.516089][ T23] audit: type=1400 audit(1681918829.772:588): avc: denied { shutdown } for pid=12112 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 216.536364][ T23] audit: type=1400 audit(1681918829.772:589): avc: denied { read } for pid=12112 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 15:40:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x4, 0x1, @dev}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0x4, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x14, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}]}]}, 0x78}}, 0x0) 15:40:30 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) flock(0xffffffffffffffff, 0x5) 15:40:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x0, 0x9007}, 0x4) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) 15:40:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) flock(0xffffffffffffffff, 0x5) 15:40:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x4, 0x1, @dev}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0x4, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x14, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}]}]}, 0x78}}, 0x0) 15:40:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) [ 216.837380][T12125] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 216.846768][T12125] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 15:40:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x4, 0x1, @dev}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0x4, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x14, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}]}]}, 0x78}}, 0x0) [ 216.897233][T12131] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 216.906584][T12131] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 15:40:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x4, 0x1, @dev}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0x4, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x14, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @local}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @remote}]}]}, 0x78}}, 0x0) [ 216.943726][T12140] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 216.986153][T12143] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 15:40:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:31 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:31 executing program 4: r0 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) setresuid(0xee01, 0xee00, 0xffffffffffffffff) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:40:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:31 executing program 4: r0 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) setresuid(0xee01, 0xee00, 0xffffffffffffffff) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:40:31 executing program 4: r0 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) setresuid(0xee01, 0xee00, 0xffffffffffffffff) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:40:31 executing program 4: r0 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) setresuid(0xee01, 0xee00, 0xffffffffffffffff) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:40:31 executing program 4: r0 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) setresuid(0xee01, 0xee00, 0xffffffffffffffff) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:40:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:31 executing program 4: r0 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) setresuid(0xee01, 0xee00, 0xffffffffffffffff) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:40:31 executing program 4: r0 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) setresuid(0xee01, 0xee00, 0xffffffffffffffff) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:40:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:32 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a00001a}]) io_destroy(r1) 15:40:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:33 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) flock(0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f00000000c0), r0) sendmsg$NFC_CMD_SE_IO(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r2, 0x1}, 0x14}}, 0x0) 15:40:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x48}}, 0x0) 15:40:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x48}}, 0x0) 15:40:34 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) flock(0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f00000000c0), r0) sendmsg$NFC_CMD_SE_IO(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r2, 0x1}, 0x14}}, 0x0) 15:40:34 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$LOOP_SET_STATUS64(r0, 0x4c07, 0x0) 15:40:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x48}}, 0x0) 15:40:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:34 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) flock(0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f00000000c0), r0) sendmsg$NFC_CMD_SE_IO(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r2, 0x1}, 0x14}}, 0x0) 15:40:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x3}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x48}}, 0x0) 15:40:34 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) flock(0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f00000000c0), r0) sendmsg$NFC_CMD_SE_IO(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r2, 0x1}, 0x14}}, 0x0) 15:40:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000001c0), 0x1, 0x140, &(0x7f0000000200)="$eJzs27Fq21AUBuDj2m3ddvFcOgi6dDJtn6CluFAqaEnwkEwJOFnsYIgXJZMfJS8YCJ683ZAo2Imxhwy2IPq+RT/8CO4dpMMV6OjT2XAwnpyO/8+i3WhE60dkMW9EJ15FM0rTAABeknlKcZNSSm+n8e4qUkpVrwgA2DbzHwDqx/wHgPox/wGgfvYPDv/+zPPeXpa1I66nRb/ol9ey//0n733N7nWWd82Kot9c9N/KPnvav473D/33tf2b+PK57O+6X//ylf5DDLa/fQAAAKiFbraw9nzf7W7qy/To+8DK+b0VH1s72wYA8AyTi8vh8Wh0ci4IgrAIVb+ZgG1bPvRVrwQAAAAAAAAAAAAAANhkF78TVb1HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWHUbAAD//0DvUik=") 15:40:34 executing program 3: r0 = socket(0x2, 0x3, 0x3) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 15:40:35 executing program 3: r0 = socket(0x2, 0x3, 0x3) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 15:40:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {0x2}, [@NLBL_MGMT_A_DOMAIN={0x22, 0x1, '\xde}){\n\xbeH\x02\xb3[mj\xc6\xdd\xb5\xb5\xdau/E/\x9ccD\x8ag\x18\x03\x00\x00'}]}, 0x38}}, 0x0) 15:40:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') lseek(r0, 0x2a, 0x0) 15:40:35 executing program 3: r0 = socket(0x2, 0x3, 0x3) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 15:40:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:36 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:36 executing program 3: r0 = socket(0x2, 0x3, 0x3) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 15:40:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x2, 0x1) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000005c0)={{0x1200}, 0x100, './file0\x00'}) 15:40:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:36 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x402, 0x3ff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0x1500000000000000}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0)='\"', &(0x7f0000000380)=""/247}, 0x20) 15:40:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 15:40:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0xcc2d92c5fd1ed7cb, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@multicast1}, {@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 15:40:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in=@dev, 0x0, 0x0, 0x0, 0x4, 0xa, 0x0, 0x0, 0x87}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x402, 0x3ff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0x1500000000000000}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0)='\"', &(0x7f0000000380)=""/247}, 0x20) 15:40:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x402, 0x3ff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0x1500000000000000}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0)='\"', &(0x7f0000000380)=""/247}, 0x20) 15:40:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b700000001000000bfa30000000000000703000020feffff720af0fff8ffffff71a4f0ff0000000025040000000000002d400500000000004704000001ed00007b130000000000001d440000000000007a0a20fe00ffffffdb03000050000000b5000000000000009500000000000000023bc065b7a379d17cf9333379fc9e94af69912435f1a864a710aad58db6a6c3692e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5be14ecf7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e347a8ad880d2cd829b847400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af8612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5e69048ddff6da409d6e37c4f46756d31cb467600ade70037610cd37e4cd35adae356e1c51f03fb8a63e089679216da18ec0ae564162a27afea62d84f3a10746443d64364f50000e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc286463a2b1e992894269f478341d02d0f5ad4bcb524a5a17f48a7382f13d000000225d85ae49cee383dc5049076b98fb6853ab39e415140200000020cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d710b651f898ba749e40bc6980fe78683ac5c0c31030699ddd71063be9261b2e1aab1675b34a22048516d6aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe0e669e5e20100005353193f82ade69d0540059fe6c7fe7cd8697502c7596566d6740300da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc02290beaeb883418f562ae00003ea96d10f172c0374d6eed82641687f3b3a70bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24c87afce829ba0f85da6d8a8f18ea40ab959f6074ab2a4009b9e5f07ab5138aa6e3d37fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0cbe02b6e4114f244a9bf93f04beb72f0861f7580e6b0b384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a9b702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b728fe26e37037f27feeb741680f6f2f9a6a8346962a350845ffa0d829e4f79ad7d87906943408e6df3adbfd03aac93df8866fb010aecfed9092ca4d0f3e1116a0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a530600d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91114a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe92c7719b3d654026c6ea08b83b123145ab5703dad84466b201ddeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d583c56ff0f40b1dba94a6ea80c33ead5722c3293986e02c8e0a6dda1eca493f14795bd068826fe8df15efaaeea831555877f958a19e499666a38d6ee6ba65893ff1f908b003fdd85596cb1037932f5954f31a8784d0899ed888141e2fae6691d1aee1da02ba516467df3e7d1daac19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec01a8aa7749f3187e9efb00000000e0884160b765b07ec9ba020362310223c81e48d6d3b6e5b50d45248efe43a409773e3ed01cd663f3aaab9e1c0000f43b64bb54e5b30be3399e3dd1eb1cfd1935a323023fe5792879833c7eb356b95cfb135045b1d8f7da2fa5bfedef411d0791523a9e64c884e9dfed9cd413afe66bd8ee831cdb34726fe0434fbf44c7b33a853330bcaf37ba4e36705807468b37d32087e599165f1bce015145444ef5967b44322249b99cd4876015b2d1874be9846f7c1653c02d2ef9a75fdc45820c69bbe1cb575f9aa21aa9d3d58bd5e5fe026142a72e24049b8400c4a28b2d5db8d5f53cb354fba19975fb0b3739baae51cb4b034993ef1463dcdba2da419b320420efdd091d7f6e83c8ac2ccc6c9392a42a33907421ab847c9590c213eda9a7e1db598a23e75a3c0933fc803ca994a86476b995c37c445f68fd99fb4d335ff00d15bc4630c994000000000000000000a236a791bcb6eff8d488041db6b8f2c158c2c3f4baacd0c8cc7eb1fd7fba93237e598771cf6f281aa72139d51c4b89c8"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 15:40:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'veth1_vlan\x00', &(0x7f0000000140)=@ethtool_sfeatures={0x3b, 0x2, [{0x7}, {}]}}) 15:40:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'veth1_vlan\x00', &(0x7f0000000140)=@ethtool_sfeatures={0x3b, 0x2, [{0x7}, {}]}}) 15:40:37 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000200)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @multicast1, {[@rr={0x7, 0x3, 0x32}, @timestamp={0x44, 0xc, 0x8, 0x0, 0x0, [0x0, 0x0]}]}}, {0x12, 0x0, 0x0, @empty}}}}}, 0x0) 15:40:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 15:40:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'veth1_vlan\x00', &(0x7f0000000140)=@ethtool_sfeatures={0x3b, 0x2, [{0x7}, {}]}}) 15:40:37 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000200)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @multicast1, {[@rr={0x7, 0x3, 0x32}, @timestamp={0x44, 0xc, 0x8, 0x0, 0x0, [0x0, 0x0]}]}}, {0x12, 0x0, 0x0, @empty}}}}}, 0x0) 15:40:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x402, 0x3ff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0x1500000000000000}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0)='\"', &(0x7f0000000380)=""/247}, 0x20) 15:40:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0xcc2d92c5fd1ed7cb, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@multicast1}, {@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 15:40:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x402, 0x3ff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0x1500000000000000}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0)='\"', &(0x7f0000000380)=""/247}, 0x20) 15:40:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'veth1_vlan\x00', &(0x7f0000000140)=@ethtool_sfeatures={0x3b, 0x2, [{0x7}, {}]}}) 15:40:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 15:40:37 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000200)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @multicast1, {[@rr={0x7, 0x3, 0x32}, @timestamp={0x44, 0xc, 0x8, 0x0, 0x0, [0x0, 0x0]}]}}, {0x12, 0x0, 0x0, @empty}}}}}, 0x0) 15:40:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x402, 0x3ff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0x1500000000000000}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0)='\"', &(0x7f0000000380)=""/247}, 0x20) 15:40:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0xcc2d92c5fd1ed7cb, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@multicast1}, {@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 15:40:37 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000200)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @multicast1, {[@rr={0x7, 0x3, 0x32}, @timestamp={0x44, 0xc, 0x8, 0x0, 0x0, [0x0, 0x0]}]}}, {0x12, 0x0, 0x0, @empty}}}}}, 0x0) 15:40:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x402, 0x3ff, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r0, 0x0, 0x1500000000000000}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0)='\"', &(0x7f0000000380)=""/247}, 0x20) 15:40:37 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0xcc2d92c5fd1ed7cb, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@multicast1}, {@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 15:40:37 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 5: socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000000000), 0x0) r0 = syz_io_uring_setup(0x1e53, &(0x7f0000000100), &(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) pipe2(&(0x7f0000000000), 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002080)) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1c0, 0xb8, 0x43, 0xa0, 0x0, 0x98, 0x178, 0x178, 0x178, 0x178, 0x178, 0x49, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00'}, 0x12a, 0x70, 0x90, 0x0, {0x0, 0x7a010000}}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x220) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) socket$inet6(0xa, 0x80003, 0x6) socket$inet6(0xa, 0x80003, 0x6) syz_io_uring_setup(0x6da4, &(0x7f0000000200), &(0x7f0000002000/0x4000)=nil, &(0x7f0000003000/0x1000)=nil, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) io_uring_enter(r0, 0x826, 0x0, 0x0, 0x0, 0x20000000) 15:40:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x4, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 15:40:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x12}, @NFTA_SET_DESC={0x14, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}]}]}]}], {0x14, 0x10}}, 0x78}}, 0x0) 15:40:37 executing program 5: socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000000000), 0x0) r0 = syz_io_uring_setup(0x1e53, &(0x7f0000000100), &(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) pipe2(&(0x7f0000000000), 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002080)) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1c0, 0xb8, 0x43, 0xa0, 0x0, 0x98, 0x178, 0x178, 0x178, 0x178, 0x178, 0x49, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00'}, 0x12a, 0x70, 0x90, 0x0, {0x0, 0x7a010000}}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x220) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) socket$inet6(0xa, 0x80003, 0x6) socket$inet6(0xa, 0x80003, 0x6) syz_io_uring_setup(0x6da4, &(0x7f0000000200), &(0x7f0000002000/0x4000)=nil, &(0x7f0000003000/0x1000)=nil, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) io_uring_enter(r0, 0x826, 0x0, 0x0, 0x0, 0x20000000) 15:40:37 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x2, 0x1, 0x3, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0x80}}]}}, @CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x8]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x1}, @CTA_LABELS_MASK={0xc, 0x17, [0x7ff, 0x8]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x81}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008804}, 0x2004c040) 15:40:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 15:40:37 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, &(0x7f0000000000)=0x7ff, 0x9, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:40:37 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 15:40:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x12}, @NFTA_SET_DESC={0x14, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}]}]}]}], {0x14, 0x10}}, 0x78}}, 0x0) 15:40:37 executing program 5: socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000000000), 0x0) r0 = syz_io_uring_setup(0x1e53, &(0x7f0000000100), &(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) pipe2(&(0x7f0000000000), 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002080)) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1c0, 0xb8, 0x43, 0xa0, 0x0, 0x98, 0x178, 0x178, 0x178, 0x178, 0x178, 0x49, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00'}, 0x12a, 0x70, 0x90, 0x0, {0x0, 0x7a010000}}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x220) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) socket$inet6(0xa, 0x80003, 0x6) socket$inet6(0xa, 0x80003, 0x6) syz_io_uring_setup(0x6da4, &(0x7f0000000200), &(0x7f0000002000/0x4000)=nil, &(0x7f0000003000/0x1000)=nil, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) io_uring_enter(r0, 0x826, 0x0, 0x0, 0x0, 0x20000000) 15:40:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 15:40:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x2, 0x1, 0x3, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0x80}}]}}, @CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x8]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x1}, @CTA_LABELS_MASK={0xc, 0x17, [0x7ff, 0x8]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x81}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008804}, 0x2004c040) 15:40:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x2) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)) 15:40:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000009c0)={0x14, r2, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 15:40:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 15:40:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x12}, @NFTA_SET_DESC={0x14, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}]}]}]}], {0x14, 0x10}}, 0x78}}, 0x0) 15:40:37 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)={0x28, r0, 0x713, 0x0, 0x0, {{0x67}, {@val={0x67, 0xe}, @val={0xc}}}}, 0x28}}, 0x0) 15:40:37 executing program 5: socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000000000), 0x0) r0 = syz_io_uring_setup(0x1e53, &(0x7f0000000100), &(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) pipe2(&(0x7f0000000000), 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002080)) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1c0, 0xb8, 0x43, 0xa0, 0x0, 0x98, 0x178, 0x178, 0x178, 0x178, 0x178, 0x49, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00'}, 0x12a, 0x70, 0x90, 0x0, {0x0, 0x7a010000}}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x220) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) socket$inet6(0xa, 0x80003, 0x6) socket$inet6(0xa, 0x80003, 0x6) syz_io_uring_setup(0x6da4, &(0x7f0000000200), &(0x7f0000002000/0x4000)=nil, &(0x7f0000003000/0x1000)=nil, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) io_uring_enter(r0, 0x826, 0x0, 0x0, 0x0, 0x20000000) 15:40:37 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x5, &(0x7f0000000040), 0x4) 15:40:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x2, 0x1, 0x3, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0x80}}]}}, @CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x8]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x1}, @CTA_LABELS_MASK={0xc, 0x17, [0x7ff, 0x8]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x81}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008804}, 0x2004c040) 15:40:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x12}, @NFTA_SET_DESC={0x14, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}]}]}]}], {0x14, 0x10}}, 0x78}}, 0x0) 15:40:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 15:40:37 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x8000000, 0x3d0, 0x1f0, 0x0, 0x130, 0x0, 0x350, 0x418, 0x418, 0x418, 0x418, 0x418, 0x6, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'pim6reg1\x00', 'team0\x00', {}, {}, 0x0, 0x6}, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast2}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'wg0\x00', 'nicvf0\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) 15:40:37 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x5, &(0x7f0000000040), 0x4) 15:40:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000180)=0x1, 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f00000010c0)=""/4096, 0x0, 0x1000, 0x8}, 0x20) 15:40:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e80000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mq_notify(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}) 15:40:37 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)={0x28, r0, 0x713, 0x0, 0x0, {{0x67}, {@val={0x67, 0xe}, @val={0xc}}}}, 0x28}}, 0x0) [ 224.100381][T12409] __nla_validate_parse: 2 callbacks suppressed [ 224.100395][T12409] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 224.110062][ T23] audit: type=1400 audit(1681918837.423:590): avc: denied { setopt } for pid=12411 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 15:40:37 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x5, &(0x7f0000000040), 0x4) 15:40:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000180)=0x1, 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f00000010c0)=""/4096, 0x0, 0x1000, 0x8}, 0x20) 15:40:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e80000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mq_notify(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}) 15:40:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x2, 0x1, 0x3, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0x80}}]}}, @CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x8]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x1}, @CTA_LABELS_MASK={0xc, 0x17, [0x7ff, 0x8]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x81}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008804}, 0x2004c040) 15:40:37 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x5, &(0x7f0000000040), 0x4) [ 224.176259][ T23] audit: type=1400 audit(1681918837.463:591): avc: denied { setopt } for pid=12414 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 224.211621][T12425] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 15:40:37 executing program 4: rmdir(&(0x7f0000000140)='\x00') 15:40:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000180)=0x1, 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f00000010c0)=""/4096, 0x0, 0x1000, 0x8}, 0x20) 15:40:37 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x8000000, 0x3d0, 0x1f0, 0x0, 0x130, 0x0, 0x350, 0x418, 0x418, 0x418, 0x418, 0x418, 0x6, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'pim6reg1\x00', 'team0\x00', {}, {}, 0x0, 0x6}, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast2}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'wg0\x00', 'nicvf0\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) 15:40:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e80000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mq_notify(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}) 15:40:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002a00)=@delchain={0x30, 0x24, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x2}, {0x4}}]}, 0x30}}, 0x0) 15:40:37 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)={0x28, r0, 0x713, 0x0, 0x0, {{0x67}, {@val={0x67, 0xe}, @val={0xc}}}}, 0x28}}, 0x0) 15:40:37 executing program 4: rmdir(&(0x7f0000000140)='\x00') 15:40:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000180)=0x1, 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f00000010c0)=""/4096, 0x0, 0x1000, 0x8}, 0x20) 15:40:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e80000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mq_notify(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}) 15:40:37 executing program 4: rmdir(&(0x7f0000000140)='\x00') 15:40:37 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0x80045510, &(0x7f00000000c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}) 15:40:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002a00)=@delchain={0x30, 0x24, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x2}, {0x4}}]}, 0x30}}, 0x0) 15:40:37 executing program 4: rmdir(&(0x7f0000000140)='\x00') 15:40:37 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)={0x28, r0, 0x713, 0x0, 0x0, {{0x67}, {@val={0x67, 0xe}, @val={0xc}}}}, 0x28}}, 0x0) [ 224.448504][T12451] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 224.466471][T12447] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 224.517460][T12465] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 224.540712][T12466] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 15:40:38 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x8000000, 0x3d0, 0x1f0, 0x0, 0x130, 0x0, 0x350, 0x418, 0x418, 0x418, 0x418, 0x418, 0x6, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'pim6reg1\x00', 'team0\x00', {}, {}, 0x0, 0x6}, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast2}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'wg0\x00', 'nicvf0\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) 15:40:38 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x48, 0x16, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_bond\x00'}]}]}]}], {0x14, 0x10}}, 0xd8}}, 0x0) 15:40:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'wg2\x00', {0x2, 0x0, @loopback}}) 15:40:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002a00)=@delchain={0x30, 0x24, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x2}, {0x4}}]}, 0x30}}, 0x0) 15:40:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xfd58) 15:40:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xfd58) 15:40:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x48, 0x16, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_bond\x00'}]}]}]}], {0x14, 0x10}}, 0xd8}}, 0x0) 15:40:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'wg2\x00', {0x2, 0x0, @loopback}}) 15:40:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x48, 0x16, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_bond\x00'}]}]}]}], {0x14, 0x10}}, 0xd8}}, 0x0) 15:40:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'wg2\x00', {0x2, 0x0, @loopback}}) 15:40:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xfd58) [ 224.733679][ T23] audit: type=1400 audit(1681918838.043:592): avc: denied { getopt } for pid=12467 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 224.757969][T12474] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:40:38 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x8000000, 0x3d0, 0x1f0, 0x0, 0x130, 0x0, 0x350, 0x418, 0x418, 0x418, 0x418, 0x418, 0x6, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'pim6reg1\x00', 'team0\x00', {}, {}, 0x0, 0x6}, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast2}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'wg0\x00', 'nicvf0\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) 15:40:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'wg2\x00', {0x2, 0x0, @loopback}}) 15:40:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002a00)=@delchain={0x30, 0x24, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x2}, {0x4}}]}, 0x30}}, 0x0) 15:40:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x48, 0x16, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_bond\x00'}]}]}]}], {0x14, 0x10}}, 0xd8}}, 0x0) 15:40:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xfd58) 15:40:38 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 225.030832][T12499] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:40:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:40:38 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:40:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:40:38 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:40:38 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:40:38 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:40:38 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:40:38 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000240)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0x448}}, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r3, 0x4) 15:40:38 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:40:38 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000240)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0x448}}, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r3, 0x4) 15:40:38 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140), 0x10) set_mempolicy(0x1, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 15:40:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:38 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000240)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0x448}}, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r3, 0x4) 15:40:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:38 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x4000000) getsockopt$inet_tcp_buf(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x2100, 0x0, 0x0, 0x0) 15:40:38 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000240)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0x448}}, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r3, 0x4) 15:40:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@datasec={0x7, 0x2, 0x0, 0xf, 0x3, [{0x5, 0x0, 0x2}, {0x2, 0x2, 0x2}], "0fc0fa"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "1c"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000280)=""/143, 0x55, 0x8f, 0x1}, 0x20) 15:40:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:39 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x700, 0x1a2442) write$evdev(r0, &(0x7f00000001c0)=[{{0x77359400}, 0x1, 0x1}], 0x18) 15:40:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@datasec={0x7, 0x2, 0x0, 0xf, 0x3, [{0x5, 0x0, 0x2}, {0x2, 0x2, 0x2}], "0fc0fa"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "1c"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000280)=""/143, 0x55, 0x8f, 0x1}, 0x20) 15:40:39 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCFLSH(r0, 0x542e, 0x200000000000000) 15:40:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x80000}]}]}, 0x54}}, 0x0) 15:40:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x18, r1, 0xb4f, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:40:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@datasec={0x7, 0x2, 0x0, 0xf, 0x3, [{0x5, 0x0, 0x2}, {0x2, 0x2, 0x2}], "0fc0fa"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "1c"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000280)=""/143, 0x55, 0x8f, 0x1}, 0x20) 15:40:39 executing program 1: keyctl$get_security(0x11, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) keyctl$read(0xb, 0x0, &(0x7f0000001080)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2006fff) close(r2) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x0) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0xfd, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) copy_file_range(0xffffffffffffffff, 0x0, r4, 0x0, 0x9, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000440)='id_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='rcu_utilization\x00', 0x0) 15:40:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x80000}]}]}, 0x54}}, 0x0) 15:40:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001040), &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x7f, @local, 0x9}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001040)={r4}, &(0x7f0000000340)=0x20001048) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={r5, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x81, @local, 0xff}]}, &(0x7f0000000140)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001040)={r7}, &(0x7f0000000340)=0x20001048) 15:40:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) 15:40:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@datasec={0x7, 0x2, 0x0, 0xf, 0x3, [{0x5, 0x0, 0x2}, {0x2, 0x2, 0x2}], "0fc0fa"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "1c"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000280)=""/143, 0x55, 0x8f, 0x1}, 0x20) 15:40:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x18, r1, 0xb4f, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:40:39 executing program 1: keyctl$get_security(0x11, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be876602d985430cea0162ab99cf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000010000000000000000000010008bc0d90500000000000000495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fece0c6ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5875c50c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a998de0842a486721763390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81006386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378a921c7f7f6933c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030100000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6ffff0a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af28c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d832"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) keyctl$read(0xb, 0x0, &(0x7f0000001080)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2006fff) close(r2) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x0) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0xfd, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) copy_file_range(0xffffffffffffffff, 0x0, r4, 0x0, 0x9, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000440)='id_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='rcu_utilization\x00', 0x0) 15:40:39 executing program 5: keyctl$get_security(0x11, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) keyctl$read(0xb, 0x0, &(0x7f0000001080)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2006fff) close(r2) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x0) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0xfd, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) copy_file_range(0xffffffffffffffff, 0x0, r4, 0x0, 0x9, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000440)='id_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='rcu_utilization\x00', 0x0) 15:40:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) 15:40:39 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x18, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x5}]}, 0x18}}, 0x0) 15:40:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) [ 225.864865][ T23] audit: type=1400 audit(1681918839.164:593): avc: denied { write } for pid=12602 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 15:40:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x18, r1, 0xb4f, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:40:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x80000}]}]}, 0x54}}, 0x0) 15:40:39 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x18, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x5}]}, 0x18}}, 0x0) 15:40:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) 15:40:39 executing program 1: keyctl$get_security(0x11, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) keyctl$read(0xb, 0x0, &(0x7f0000001080)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2006fff) close(r2) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x0) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0xfd, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000002080)=ANY=[@ANYBLOB="850000006d00000065000000000000009100000000000000afcd48d6494d614dcc6fabec470db2c61612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d1fc79c987d669ffa4aaca0f9d9924be41a9169bdfaf16d1c0b15390bb8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e36e231b7ae0da8616d2b7958f91f5d822175ed60ab386d94af8197d5cdb59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494da484ebad0407d9440b69ad9f19ab8b4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2294237bebfc08e0d5976a942b846970cfd98b02e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2482aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392957b4f979ea17117813201bafe4f0f6ea5a6c957ada0c548552b571bed564c0a2fcb6da006b5d0fe4886a9edee77f6986319f85dd06a24c37e588959f34d2c5f649b85e5b0baada5f9aad49da960f10ddd86e2d1638f90b79c7f8526a13702d613dc88670f3478182136c74d163716ba82392d65582b33e7dfd27e69d71a19da16f2c3e683176d47c2599d03008c05c8ce9edd1ef5cc236934ac483b8bf80794ecb7ac00ce453c14d29dab6dcf1855a1ab3d7c2ee8d43e479f3a17a4ac213bfa477f3da41564aac25192cb10e4e4dfc5cfbdef1d4cea17286ec8f6db16dc62b8ca086734223cf718c6bb21eae7eca3cb1baa3105a33cfc2cd90adf3720d13cd114695fea0cd01735a15a3c4e101ac6713c630445402b02e35e48f049b44631062d465506ceec6947c78fd2bb24c288d719668a712d529d9d0ba7b0db4cca204c6fae33f60c01559eafbed82203bf45781e3681c0ec1d041e18dde1ae9033946a7acf61d1c3bd1c988aabea18a402a93e156bcf4a4043bfe7575a977b0e0a76647f949edd8e86b58702e5edc98405db78242b542ab94182db71a0d5a0354ceb4399aa35ecfed552652f93f621bfeb4d355a92403fed0000000000e699bf10f0ed955a771fee639f0533bd40b2ed03caaf81e4265bf4b3649ec96e850cb9c4fa75fe50d266dde7a22e8b9e4f68731704743bd6ff7f62506a64b90a89dbeea61bb480cafd4d557c1b1b23aff85096a53ac3d3bf0b3e647d8e15afeecaca6536de1fe99b3415234e01fff773cdb8ca7bea113ac2ae22054075fecb6947caf2bccab388e4036f157eae1b81b53481bb2a8f7cf0807499e52ecbfc17579256b9bc23fb6e3aa7e678ccfbf3455630f8cecfbebf6eb93fe1030ea1cc8fce811a4efda9da8841ecc2a50790b7d5c7c9f1cbfc890036002b3ef0f48035433ec581e53a502cce7bdb42715d837c05d2180d04fa4a48e6eea9429a2e15913e85134805664f3d168f9ecb17e7c15d8119897d56e9f01ec4f9c020ac76ab8695098f90037b59b908ab7b2b474edfa62fb2e6f18d31f0a3b8d1778a53850987a998f2cc042916c985c7c1104591e927cdb2238e6e0abeeca1365dec2bdf1c36d734818bea2fb8b37930307fe5c7e913053bed9cbe50866c6dd2fb5dc81c72b7f9c6bfb020f96f9a21d17e3c82a3098b12d7d547ac02fbf7803e5546b3c4240a26d69a242112bbf278b6c46dab3d9e737d803a569d30b5aafc1cf891a00000001abe05cc25aa16510baed76be601efe4037f6f14c10000000000000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) copy_file_range(0xffffffffffffffff, 0x0, r4, 0x0, 0x9, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000440)='id_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='rcu_utilization\x00', 0x0) 15:40:39 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x18, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x5}]}, 0x18}}, 0x0) 15:40:39 executing program 5: keyctl$get_security(0x11, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) keyctl$read(0xb, 0x0, &(0x7f0000001080)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2006fff) close(r2) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x0) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0xfd, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) copy_file_range(0xffffffffffffffff, 0x0, r4, 0x0, 0x9, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000440)='id_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='rcu_utilization\x00', 0x0) 15:40:39 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0x0, r0, 0x1) 15:40:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x18, r1, 0xb4f, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:40:39 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0x0, r0, 0x1) 15:40:39 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x18, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x5}]}, 0x18}}, 0x0) 15:40:39 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0x0, r0, 0x1) 15:40:39 executing program 5: keyctl$get_security(0x11, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be876602d985430cea0162ab99cf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000010000000000000000000010008bc0d90500000000000000495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fece0c6ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5875c50c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a998de0842a486721763390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81006386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378a921c7f7f6933c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030100000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6ffff0a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af28c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d832"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) keyctl$read(0xb, 0x0, &(0x7f0000001080)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2006fff) close(r2) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x0) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0xfd, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) copy_file_range(0xffffffffffffffff, 0x0, r4, 0x0, 0x9, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000440)='id_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='rcu_utilization\x00', 0x0) 15:40:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x80000}]}]}, 0x54}}, 0x0) 15:40:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CT_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) 15:40:39 executing program 2: r0 = syz_io_uring_setup(0x77b, &(0x7f0000000080), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ee6000/0x3000)=nil, &(0x7f00000014c0)=0x0, &(0x7f00000001c0)=0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@hci}, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000200)) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) 15:40:39 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0x0, r0, 0x1) 15:40:39 executing program 1: keyctl$get_security(0x11, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) keyctl$read(0xb, 0x0, &(0x7f0000001080)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2006fff) close(r2) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x145842, 0x0) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0xfd, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) copy_file_range(0xffffffffffffffff, 0x0, r4, 0x0, 0x9, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000440)='id_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='rcu_utilization\x00', 0x0) 15:40:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r1, 0x601, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 15:40:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CT_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) 15:40:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f00004bf000/0x4000)=nil, 0x4000, 0x14) 15:40:39 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r1, 0x601, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 15:40:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r1, 0x601, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 15:40:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CT_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) 15:40:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f00004bf000/0x4000)=nil, 0x4000, 0x14) 15:40:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 15:40:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CT_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) 15:40:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r1, 0x601, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 15:40:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 15:40:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 15:40:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f00004bf000/0x4000)=nil, 0x4000, 0x14) 15:40:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@rand_addr=' \x01\x00'}}, {{@in6=@mcast2}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xfff7) 15:40:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 15:40:39 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 15:40:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 15:40:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@rand_addr=' \x01\x00'}}, {{@in6=@mcast2}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xfff7) 15:40:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 15:40:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f00004bf000/0x4000)=nil, 0x4000, 0x14) 15:40:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@rand_addr=' \x01\x00'}}, {{@in6=@mcast2}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xfff7) 15:40:39 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:39 executing program 3: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:39 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:40 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:40 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:40 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@rand_addr=' \x01\x00'}}, {{@in6=@mcast2}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xfff7) 15:40:40 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0xc00c5512, &(0x7f0000000200)) 15:40:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x60, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x60}}, 0x0) 15:40:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x60, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x60}}, 0x0) 15:40:40 executing program 3: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x60, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x60}}, 0x0) 15:40:40 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:40 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:40 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x60, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x60}}, 0x0) 15:40:40 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:41 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:41 executing program 3: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:41 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:41 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:41 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0x28}) r4 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x800) close(r4) lseek(r1, 0x7ffffc, 0x0) r5 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) write(r5, &(0x7f0000000140)="8402d6f90d5bc9c84c4eb5e77a073f93784c6a2f55b58fe4b656e0f79d2a33ab5bbc89e887347f25daf260ac1aa257df5adbee68b9306c4dbb10588e9ecec0146051fde114133c8f3dd94333ee851c16978bc37c68ee113b11087aae3d78d194322d816394e7b49f2caa59ca3a91f601b08d40b239ca5d6abbb9e57dd39a3ce921fe8dc3ae22bc830b50fb0ed2d6ef71ceb4d20dbfededbf9756c812f56ef3f9cfe789f43476c482d828217d0ec02fc92a4469205cf8c124856f919cadb25f64cfde9443a734aea4ee2b549b7dd96410672c7401dbfcb7a2610cdc14731a46c51d6c071e55d041c175bc0cd1cd2d7c5fa0", 0xf1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x6}}, './bus\x00'}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, r5]}, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x800, 0x0, 0xff}, 0x20) fallocate(r8, 0x100000003, 0x0, 0x6) fallocate(r0, 0x100000003, 0xe90, 0x80fd10) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x80800) 15:40:41 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:41 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:41 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:41 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@ipv6_newaddr={0x48, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @private0={0xfc, 0x2}}, @IFA_LOCAL={0x14, 0x2, @local}, @IFA_RT_PRIORITY={0x24}]}, 0x48}}, 0x0) 15:40:41 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@ipv6_newaddr={0x48, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @private0={0xfc, 0x2}}, @IFA_LOCAL={0x14, 0x2, @local}, @IFA_RT_PRIORITY={0x24}]}, 0x48}}, 0x0) 15:40:41 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@ipv6_newaddr={0x48, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @private0={0xfc, 0x2}}, @IFA_LOCAL={0x14, 0x2, @local}, @IFA_RT_PRIORITY={0x24}]}, 0x48}}, 0x0) 15:40:41 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@ipv6_newaddr={0x48, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @private0={0xfc, 0x2}}, @IFA_LOCAL={0x14, 0x2, @local}, @IFA_RT_PRIORITY={0x24}]}, 0x48}}, 0x0) 15:40:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0x200) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c0002800500010004"], 0x3c}}, 0x0) [ 228.398138][T12788] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 228.421301][T12790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:40:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x400, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) 15:40:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000004900)=@newtaction={0x90, 0x30, 0xffff, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE64={0xc, 0x5, 0x100000001}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x4}}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) 15:40:41 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x7, 0x4) 15:40:41 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x7, 0x4) [ 228.486473][T12796] bond2: entered promiscuous mode [ 228.491551][T12796] bond2: entered allmulticast mode [ 228.497339][T12796] 8021q: adding VLAN 0 to HW filter on device bond2 [ 228.509053][T12802] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 15:40:42 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:42 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:42 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0x200) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c0002800500010004"], 0x3c}}, 0x0) 15:40:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000004900)=@newtaction={0x90, 0x30, 0xffff, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE64={0xc, 0x5, 0x100000001}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x4}}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) 15:40:42 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x7, 0x4) 15:40:42 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x7, 0x4) 15:40:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000004900)=@newtaction={0x90, 0x30, 0xffff, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE64={0xc, 0x5, 0x100000001}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x4}}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) 15:40:42 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x7, 0x4) 15:40:42 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x7, 0x4) [ 229.226157][T12818] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 229.247479][T12817] bond3: entered promiscuous mode [ 229.252631][T12817] bond3: entered allmulticast mode [ 229.258407][T12817] 8021q: adding VLAN 0 to HW filter on device bond3 15:40:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000004900)=@newtaction={0x90, 0x30, 0xffff, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_police={0x78, 0x1, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE64={0xc, 0x5, 0x100000001}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x4}}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) 15:40:42 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x7, 0x4) [ 229.271472][T12827] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 229.301777][T12833] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 15:40:43 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:43 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:43 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = eventfd(0x0) fdatasync(0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000000), 0x8) write$eventfd(r2, &(0x7f0000000140), 0x19) 15:40:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0x200) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c0002800500010004"], 0x3c}}, 0x0) 15:40:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e80000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_PAC_RESET_KEYS(0x16, 0x0) 15:40:43 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xa5, &(0x7f0000000080), &(0x7f0000000000)=0x4) 15:40:43 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xa5, &(0x7f0000000080), &(0x7f0000000000)=0x4) 15:40:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e80000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_PAC_RESET_KEYS(0x16, 0x0) 15:40:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0x200) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c0002800500010004"], 0x3c}}, 0x0) 15:40:43 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xa5, &(0x7f0000000080), &(0x7f0000000000)=0x4) 15:40:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e80000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_PAC_RESET_KEYS(0x16, 0x0) [ 230.088816][T12844] bond4: entered promiscuous mode [ 230.093979][T12844] bond4: entered allmulticast mode [ 230.100092][T12844] 8021q: adding VLAN 0 to HW filter on device bond4 15:40:43 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xa5, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 230.145231][T12856] bond5: entered promiscuous mode [ 230.150300][T12856] bond5: entered allmulticast mode [ 230.159393][T12856] 8021q: adding VLAN 0 to HW filter on device bond5 15:40:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e80000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_PAC_RESET_KEYS(0x16, 0x0) 15:40:44 executing program 1: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:44 executing program 1: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:44 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:44 executing program 5: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000002180)='./file0\x00', 0x0) 15:40:44 executing program 4: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:44 executing program 3: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:44 executing program 5: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000002180)='./file0\x00', 0x0) 15:40:44 executing program 1: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:44 executing program 3: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:44 executing program 5: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000002180)='./file0\x00', 0x0) 15:40:44 executing program 1: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:44 executing program 3: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:44 executing program 4: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:44 executing program 5: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000002180)='./file0\x00', 0x0) 15:40:44 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:44 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:44 executing program 4: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:44 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:44 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:44 executing program 4: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:44 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:44 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:44 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:45 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) write(r0, &(0x7f0000000400), 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x1000)=nil, &(0x7f00006d8000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x30a2, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index}, 0x0) io_uring_enter(r1, 0x3c53, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) vmsplice(r6, &(0x7f0000000800)=[{&(0x7f00000003c0)='F', 0x1}], 0x1, 0x0) 15:40:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:45 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:45 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:45 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:46 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:46 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:46 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:47 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:47 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:47 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:47 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000300)='./file1\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) 15:40:47 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:47 executing program 5: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:47 executing program 5: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:47 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:47 executing program 5: creat(&(0x7f0000001340)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x3) 15:40:47 executing program 0: unshare(0x600) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x11c, 0x1b, 0x0, 0x0) 15:40:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:47 executing program 0: unshare(0x600) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x11c, 0x1b, 0x0, 0x0) 15:40:47 executing program 0: unshare(0x600) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x11c, 0x1b, 0x0, 0x0) 15:40:47 executing program 0: unshare(0x600) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x11c, 0x1b, 0x0, 0x0) 15:40:48 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:48 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:48 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x250) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) 15:40:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:49 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x10d) r0 = socket$phonet(0x23, 0x2, 0x1) flock(r0, 0x5) 15:40:49 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0xfffffffffffffffe, 0x4) 15:40:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@migrate={0xa0, 0x21, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@migrate={0x50, 0x11, [{@in=@empty, @in6=@dev, @in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}]}, 0xa0}}, 0x0) 15:40:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0xc0) 15:40:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:49 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0xfffffffffffffffe, 0x4) [ 236.202731][ T23] audit: type=1400 audit(1681918849.515:594): avc: denied { create } for pid=13164 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 236.222631][ T23] audit: type=1400 audit(1681918849.515:595): avc: denied { setopt } for pid=13164 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 236.243491][T13174] __nla_validate_parse: 2 callbacks suppressed 15:40:49 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0xfffffffffffffffe, 0x4) 15:40:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@migrate={0xa0, 0x21, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@migrate={0x50, 0x11, [{@in=@empty, @in6=@dev, @in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}]}, 0xa0}}, 0x0) 15:40:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:49 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x10d) r0 = socket$phonet(0x23, 0x2, 0x1) flock(r0, 0x5) [ 236.243504][T13174] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 236.269524][ T23] audit: type=1400 audit(1681918849.515:596): avc: denied { lock } for pid=13163 comm="syz-executor.3" path="socket:[44797]" dev="sockfs" ino=44797 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 15:40:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@migrate={0xa0, 0x21, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@migrate={0x50, 0x11, [{@in=@empty, @in6=@dev, @in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}]}, 0xa0}}, 0x0) 15:40:49 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x10d) r0 = socket$phonet(0x23, 0x2, 0x1) flock(r0, 0x5) 15:40:49 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0xfffffffffffffffe, 0x4) 15:40:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0xc0) 15:40:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@migrate={0xa0, 0x21, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@migrate={0x50, 0x11, [{@in=@empty, @in6=@dev, @in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}]}, 0xa0}}, 0x0) 15:40:49 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x10d) r0 = socket$phonet(0x23, 0x2, 0x1) flock(r0, 0x5) 15:40:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) [ 236.301507][T13174] veth31: entered promiscuous mode [ 236.306691][T13174] veth31: entered allmulticast mode 15:40:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0xc0) 15:40:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) shutdown(r1, 0x0) ppoll(&(0x7f0000005ac0)=[{r2}], 0x1, &(0x7f0000005b00)={0x0, 0x3938700}, 0x0, 0x0) 15:40:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) [ 236.357211][T13192] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 236.379149][T13192] veth33: entered promiscuous mode [ 236.384356][T13192] veth33: entered allmulticast mode [ 236.390167][T13195] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:40:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0xc0) 15:40:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) [ 236.421828][T13195] veth17: entered promiscuous mode [ 236.427096][T13195] veth17: entered allmulticast mode [ 236.440315][T13206] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 236.457004][T13206] veth25: entered promiscuous mode [ 236.462136][T13206] veth25: entered allmulticast mode 15:40:49 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0xfffffffffffffffe, 0x4) 15:40:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x60, 0x2, 0x1, 0x301, 0x0, 0x0, {0xa}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00'}, {0x14, 0x4, @mcast2}}}]}]}, 0x60}}, 0x0) 15:40:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x60, 0x2, 0x1, 0x301, 0x0, 0x0, {0xa}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00'}, {0x14, 0x4, @mcast2}}}]}]}, 0x60}}, 0x0) 15:40:49 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0xfffffffffffffffe, 0x4) 15:40:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x60, 0x2, 0x1, 0x301, 0x0, 0x0, {0xa}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00'}, {0x14, 0x4, @mcast2}}}]}]}, 0x60}}, 0x0) [ 236.467404][T13208] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 236.490203][T13208] veth11: entered promiscuous mode [ 236.495369][T13208] veth11: entered allmulticast mode [ 236.501799][T13211] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 15:40:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:49 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0xfffffffffffffffe, 0x4) 15:40:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x60, 0x2, 0x1, 0x301, 0x0, 0x0, {0xa}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00'}, {0x14, 0x4, @mcast2}}}]}]}, 0x60}}, 0x0) [ 236.522875][T13211] veth35: entered promiscuous mode [ 236.528060][T13211] veth35: entered allmulticast mode [ 236.552065][T13231] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:40:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:49 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) 15:40:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:49 executing program 1: request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVdx:De', 0x0) 15:40:49 executing program 1: request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVdx:De', 0x0) [ 236.579003][T13231] veth19: entered promiscuous mode [ 236.584268][T13231] veth19: entered allmulticast mode [ 236.601061][T13234] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 236.620655][T13234] veth13: entered promiscuous mode 15:40:49 executing program 1: request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVdx:De', 0x0) 15:40:49 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) 15:40:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:49 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) 15:40:50 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) 15:40:50 executing program 1: request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVdx:De', 0x0) [ 236.625841][T13234] veth13: entered allmulticast mode [ 236.633370][T13235] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 236.658720][T13235] veth27: entered promiscuous mode [ 236.663945][T13235] veth27: entered allmulticast mode [ 236.669536][T13238] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 15:40:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:50 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) 15:40:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="e6ffffffffffffff280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000024003f0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff00000000090001006866736300000000140002"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="600100002800390d00"/20, @ANYRES32=r4, @ANYBLOB="0060ffff00000000000000000b0001006367726f75700000300102002c010100a7"], 0x160}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) 15:40:50 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) 15:40:50 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @local}, 0x200002}}, 0x2e) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r3, 0x301, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 15:40:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipmr_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, [@RTA_NH_ID={0x3}]}, 0x24}}, 0x0) 15:40:50 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) 15:40:50 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) [ 236.685855][T13238] veth37: entered promiscuous mode [ 236.691004][T13238] veth37: entered allmulticast mode [ 236.705901][T13250] veth21: entered promiscuous mode [ 236.711086][T13250] veth21: entered allmulticast mode 15:40:50 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) 15:40:50 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x71f, 0x4) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) 15:40:50 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @local}, 0x200002}}, 0x2e) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r3, 0x301, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 15:40:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipmr_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, [@RTA_NH_ID={0x3}]}, 0x24}}, 0x0) 15:40:50 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @local}, 0x200002}}, 0x2e) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r3, 0x301, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) [ 236.771898][T13264] veth29: entered promiscuous mode [ 236.777118][T13264] veth29: entered allmulticast mode [ 236.795725][T13265] veth15: entered promiscuous mode [ 236.801010][T13265] veth15: entered allmulticast mode 15:40:50 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @local}, 0x200002}}, 0x2e) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r3, 0x301, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 15:40:50 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @local}, 0x200002}}, 0x2e) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r3, 0x301, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 15:40:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 15:40:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipmr_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, [@RTA_NH_ID={0x3}]}, 0x24}}, 0x0) 15:40:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x8}, @call={0x85, 0x0, 0x0, 0xc}], &(0x7f0000001200)='GPL\x00', 0x7, 0x9f, &(0x7f0000001340)=""/159, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 15:40:50 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @local}, 0x200002}}, 0x2e) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r3, 0x301, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 15:40:50 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @local}, 0x200002}}, 0x2e) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r3, 0x301, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 15:40:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x8}, @call={0x85, 0x0, 0x0, 0xc}], &(0x7f0000001200)='GPL\x00', 0x7, 0x9f, &(0x7f0000001340)=""/159, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:50 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_DEVKEY={0x24, 0x2d, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x40}}, 0x0) 15:40:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x8}, @call={0x85, 0x0, 0x0, 0xc}], &(0x7f0000001200)='GPL\x00', 0x7, 0x9f, &(0x7f0000001340)=""/159, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:40:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x8}, @call={0x85, 0x0, 0x0, 0xc}], &(0x7f0000001200)='GPL\x00', 0x7, 0x9f, &(0x7f0000001340)=""/159, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:40:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:40:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 15:40:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="160000001d00ff0214fffffffffffff8070000001d00", 0x16) 15:40:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipmr_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, [@RTA_NH_ID={0x3}]}, 0x24}}, 0x0) 15:40:50 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 15:40:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="160000001d00ff0214fffffffffffff8070000001d00", 0x16) 15:40:50 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="160000001d00ff0214fffffffffffff8070000001d00", 0x16) 15:40:50 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="160000001d00ff0214fffffffffffff8070000001d00", 0x16) 15:40:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:40:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:51 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), 0x4) 15:40:51 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:51 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="100006000000000020"], 0x34, 0x0) chown(&(0x7f00000002c0)='./file0\x00', r1, r3) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40f40, 0x0) 15:40:51 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), 0x4) 15:40:51 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), 0x4) 15:40:51 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), 0x4) 15:40:51 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = pidfd_open(r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x0, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) 15:40:51 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), 0x4) 15:40:51 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), 0x4) 15:40:51 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="100006000000000020"], 0x34, 0x0) chown(&(0x7f00000002c0)='./file0\x00', r1, r3) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40f40, 0x0) [ 237.791261][ T23] audit: type=1400 audit(1681918851.105:597): avc: denied { getopt } for pid=13386 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 15:40:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8c}]}, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xe5, &(0x7f0000000140)=""/229, 0x0, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:51 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) bind$can_raw(r0, &(0x7f0000000200), 0x10) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000080), 0x4) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{}, {0x0, 0x1}}, {}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="1bf81bb9eb"], 0x20000600}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfff) bind$inet6(r5, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getpeername$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 15:40:51 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), 0x4) 15:40:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:51 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="100006000000000020"], 0x34, 0x0) chown(&(0x7f00000002c0)='./file0\x00', r1, r3) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40f40, 0x0) 15:40:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8c}]}, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xe5, &(0x7f0000000140)=""/229, 0x0, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:51 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="100006000000000020"], 0x34, 0x0) chown(&(0x7f00000002c0)='./file0\x00', r1, r3) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40f40, 0x0) 15:40:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = pidfd_open(r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x0, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) 15:40:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8c}]}, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xe5, &(0x7f0000000140)=""/229, 0x0, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8c}]}, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xe5, &(0x7f0000000140)=""/229, 0x0, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:40:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@delchain={0x50, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x20, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x1c, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x4}]}]}}]}, 0x50}}, 0x0) 15:40:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@delchain={0x50, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x20, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x1c, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x4}]}]}}]}, 0x50}}, 0x0) 15:40:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@delchain={0x50, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x20, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x1c, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x4}]}]}}]}, 0x50}}, 0x0) 15:40:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@delchain={0x50, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x20, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x1c, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x4}]}]}}]}, 0x50}}, 0x0) 15:40:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = pidfd_open(r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x0, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) 15:40:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@delchain={0x50, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x20, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x1c, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x4}]}]}}]}, 0x50}}, 0x0) 15:40:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x11, &(0x7f0000000040), 0x8) 15:40:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x11, &(0x7f0000000040), 0x8) 15:40:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@delchain={0x50, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x20, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x1c, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x4}]}]}}]}, 0x50}}, 0x0) 15:40:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x11, &(0x7f0000000040), 0x8) 15:40:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000507000004000000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@delchain={0x50, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}}, [@filter_kind_options=@f_flower={{0xb}, {0x20, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x1c, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x4}]}]}}]}, 0x50}}, 0x0) 15:40:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x11, &(0x7f0000000040), 0x8) 15:40:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x11, &(0x7f0000000040), 0x8) 15:40:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = pidfd_open(r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x0, 0x0) pidfd_getfd(r3, 0xffffffffffffffff, 0x0) 15:40:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000002fc0)={0x0, 0x3938700}, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:40:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x11, &(0x7f0000000040), 0x8) 15:40:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x42, 0x4, 0x4a0, 0xffffffff, 0x0, 0x2e8, 0x0, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "126b5a50cf59b1181c0e7aa9f76c067e9e47fb66d4ed87c89f1c4c7ae625"}}}, {{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'hsr0\x00'}}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) 15:40:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@private0}, {@in6=@mcast1, 0x0, 0x3c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x8, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 15:40:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x2c}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:40:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x2c}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:40:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x42, 0x4, 0x4a0, 0xffffffff, 0x0, 0x2e8, 0x0, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "126b5a50cf59b1181c0e7aa9f76c067e9e47fb66d4ed87c89f1c4c7ae625"}}}, {{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'hsr0\x00'}}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) 15:40:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@private0}, {@in6=@mcast1, 0x0, 0x3c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x8, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 15:40:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x42, 0x4, 0x4a0, 0xffffffff, 0x0, 0x2e8, 0x0, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "126b5a50cf59b1181c0e7aa9f76c067e9e47fb66d4ed87c89f1c4c7ae625"}}}, {{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'hsr0\x00'}}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) 15:40:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x2c}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:40:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x42, 0x4, 0x4a0, 0xffffffff, 0x0, 0x2e8, 0x0, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "126b5a50cf59b1181c0e7aa9f76c067e9e47fb66d4ed87c89f1c4c7ae625"}}}, {{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'hsr0\x00'}}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) 15:40:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x2c}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:40:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x2c}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:40:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@private0}, {@in6=@mcast1, 0x0, 0x3c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x8, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 15:40:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x11, &(0x7f0000000040), 0x8) 15:40:54 executing program 4: set_robust_list(0x0, 0x0) 15:40:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x2c}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:40:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="b4050000fdff7f006110600000000000c60000000000000095000000000000009f33ef60916e6e893f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7080000008c60897d4a6148a1c114d8da011bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b52710aeee835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed00"/227], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x26}, 0x10) 15:40:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x2c}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 15:40:54 executing program 4: set_robust_list(0x0, 0x0) 15:40:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@private0}, {@in6=@mcast1, 0x0, 0x3c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x8, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 15:40:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 15:40:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="b4050000fdff7f006110600000000000c60000000000000095000000000000009f33ef60916e6e893f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7080000008c60897d4a6148a1c114d8da011bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b52710aeee835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed00"/227], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x26}, 0x10) 15:40:54 executing program 4: set_robust_list(0x0, 0x0) 15:40:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x7, 0x1, '\\.\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_CLPDOI={0x8}]}, 0x54}}, 0x0) 15:40:54 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_USE_CARRIER={0x5}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff00000500f4ffff000095811d", @ANYRES32, @ANYBLOB="01f8ffff00000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 15:40:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="b4050000fdff7f006110600000000000c60000000000000095000000000000009f33ef60916e6e893f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7080000008c60897d4a6148a1c114d8da011bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b52710aeee835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed00"/227], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x26}, 0x10) 15:40:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x10, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}]}]}]}, 0x74}}, 0x0) 15:40:54 executing program 4: set_robust_list(0x0, 0x0) 15:40:54 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) dup(0xffffffffffffffff) dup(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x600000, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) 15:40:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x10, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}]}]}]}, 0x74}}, 0x0) 15:40:54 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdb3, 0x20000004, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "7b3aa7a7ebce5187", "6486ea8bf30d42f0aa289600", "3dbb73a7", "46695b2845dfcd31"}, 0x28) dup2(r0, r2) sendfile(r3, r1, 0x0, 0x800100020046) 15:40:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x10, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}]}]}]}, 0x74}}, 0x0) [ 241.384233][T13560] __nla_validate_parse: 14 callbacks suppressed [ 241.384247][T13560] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 241.398339][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 15:40:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 15:40:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="b4050000fdff7f006110600000000000c60000000000000095000000000000009f33ef60916e6e893f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7080000008c60897d4a6148a1c114d8da011bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b52710aeee835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed00"/227], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x26}, 0x10) 15:40:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x10, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}]}]}]}, 0x74}}, 0x0) 15:40:55 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdb3, 0x20000004, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "7b3aa7a7ebce5187", "6486ea8bf30d42f0aa289600", "3dbb73a7", "46695b2845dfcd31"}, 0x28) dup2(r0, r2) sendfile(r3, r1, 0x0, 0x800100020046) 15:40:55 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_USE_CARRIER={0x5}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff00000500f4ffff000095811d", @ANYRES32, @ANYBLOB="01f8ffff00000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 15:40:55 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) dup(0xffffffffffffffff) dup(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x600000, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) 15:40:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 15:40:55 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdb3, 0x20000004, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "7b3aa7a7ebce5187", "6486ea8bf30d42f0aa289600", "3dbb73a7", "46695b2845dfcd31"}, 0x28) dup2(r0, r2) sendfile(r3, r1, 0x0, 0x800100020046) 15:40:55 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdb3, 0x20000004, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "7b3aa7a7ebce5187", "6486ea8bf30d42f0aa289600", "3dbb73a7", "46695b2845dfcd31"}, 0x28) dup2(r0, r2) sendfile(r3, r1, 0x0, 0x800100020046) [ 242.161929][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 242.200917][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 15:40:55 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdb3, 0x20000004, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "7b3aa7a7ebce5187", "6486ea8bf30d42f0aa289600", "3dbb73a7", "46695b2845dfcd31"}, 0x28) dup2(r0, r2) sendfile(r3, r1, 0x0, 0x800100020046) 15:40:55 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdb3, 0x20000004, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "7b3aa7a7ebce5187", "6486ea8bf30d42f0aa289600", "3dbb73a7", "46695b2845dfcd31"}, 0x28) dup2(r0, r2) sendfile(r3, r1, 0x0, 0x800100020046) [ 242.254441][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 242.293916][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 15:40:55 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdb3, 0x20000004, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "7b3aa7a7ebce5187", "6486ea8bf30d42f0aa289600", "3dbb73a7", "46695b2845dfcd31"}, 0x28) dup2(r0, r2) sendfile(r3, r1, 0x0, 0x800100020046) [ 242.308849][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 242.393558][T13597] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 242.410199][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 15:40:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 15:40:56 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0100000000000000f0ff01100000080001"], 0x1c}}, 0x0) 15:40:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) 15:40:56 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) dup(0xffffffffffffffff) dup(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x600000, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) 15:40:56 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_USE_CARRIER={0x5}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff00000500f4ffff000095811d", @ANYRES32, @ANYBLOB="01f8ffff00000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 15:40:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 15:40:56 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa02, {{0x6000000, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) 15:40:56 executing program 3: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000600)={0xffffffffffffffff}) tee(r2, r1, 0x3, 0x0) [ 243.120391][T13621] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 15:40:56 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) dup(0xffffffffffffffff) dup(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x600000, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) 15:40:56 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) [ 243.710295][ T23] audit: type=1400 audit(1681918857.016:598): avc: denied { checkpoint_restore } for pid=13624 comm="syz-executor.1" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 15:40:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) 15:40:57 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_USE_CARRIER={0x5}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff00000500f4ffff000095811d", @ANYRES32, @ANYBLOB="01f8ffff00000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 15:40:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 15:40:57 executing program 3: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000600)={0xffffffffffffffff}) tee(r2, r1, 0x3, 0x0) 15:40:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) [ 244.026947][T13640] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 15:40:57 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) 15:40:58 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$eJzs3bFrE1EcB/BfbdXikiJCQRwOXJxCW+ieIhXEgNISpCJitCmUJhQsBBRs3QQHN0dHN1FwcfOPEHQVHcTR4tKhEDEnSSNRYyG92Hw+y/24977we8s9brh3N8/U1pbXN1a2tz/H+PhIjBWiEDsjMRFHYjRSDwIAOEx2Go342khl3QsAcDDs/wAwfHrc/68cYEsAQJ/t//3/ydKbD+VKYbZfnQEA/bK4dO3SXLE4v5Ak4xG1h/VSvZRe0/G5lViNalRiKnKxG9FoSesLF4vzU0nTRJRqWz/zW/XSaGd+OnIx0T0/neaTzvzROLE3PxO5ONU9P9M1fyzOnd2Tz0cu3t6O9ajGcvzItvOb00ly/nLxl/zx5jwAAAAAAAAAAAAAAAAAAAAAAOiHfNLS9fyefP5342n+H84Hap2v86iZH4vTY9muHQAAAAAAAAAAAAAAAAAAAAbFxt17a+VqtXKnVdxaWD3ZeecQF7vzj18MQBv/X/HqeeXdsxvXF3ua/O39QPS8/+Lq/T/MeTkIHf69mHxaKL/e/Pil11TWTyYAAAAAAAAAAAAAAAAAABg+7Y9+s+4EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALLT/v9/34pPs5MzWS8TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAh9z0AAP//RNm0Fg==") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:58 executing program 3: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000600)={0xffffffffffffffff}) tee(r2, r1, 0x3, 0x0) 15:40:58 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="696f636861727365743d6d61636761656c69632c726f6469722c73686f72746e616d653d6d697865642c73686f72746e616d653d6c6f7765722c756e695f786c6174653d302c757466383d312c636865636b3d7374726963742c576e695f786c6174653d302c757365667265652c747a3d5554432c64656275672c73686f72746e616d653d6d697865642c73686f72746e616d653d77696e39352c756e695f786c6174653d312c726f6469722c756e695f78c46174653d312c696f636861727365743d61736369692c756e6947786c6174653d302c646d61736b3d30303030303030303030303030303030303230303030302c696f636861727365743d63703836302c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:58 executing program 5: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:59 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="696f636861727365743d6d61636761656c69632c726f6469722c73686f72746e616d653d6d697865642c73686f72746e616d653d6c6f7765722c756e695f786c6174653d302c757466383d312c636865636b3d7374726963742c576e695f786c6174653d302c757365667265652c747a3d5554432c64656275672c73686f72746e616d653d6d697865642c73686f72746e616d653d77696e39352c756e695f786c6174653d312c726f6469722c756e695f78c46174653d312c696f636861727365743d61736369692c756e6947786c6174653d302c646d61736b3d30303030303030303030303030303030303230303030302c696f636861727365743d63703836302c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) 15:40:59 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:59 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:59 executing program 3: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000600)={0xffffffffffffffff}) tee(r2, r1, 0x3, 0x0) 15:41:00 executing program 5: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:00 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$eJzs3bFrE1EcB/BfbdXikiJCQRwOXJxCW+ieIhXEgNISpCJitCmUJhQsBBRs3QQHN0dHN1FwcfOPEHQVHcTR4tKhEDEnSSNRYyG92Hw+y/24977we8s9brh3N8/U1pbXN1a2tz/H+PhIjBWiEDsjMRFHYjRSDwIAOEx2Go342khl3QsAcDDs/wAwfHrc/68cYEsAQJ/t//3/ydKbD+VKYbZfnQEA/bK4dO3SXLE4v5Ak4xG1h/VSvZRe0/G5lViNalRiKnKxG9FoSesLF4vzU0nTRJRqWz/zW/XSaGd+OnIx0T0/neaTzvzROLE3PxO5ONU9P9M1fyzOnd2Tz0cu3t6O9ajGcvzItvOb00ly/nLxl/zx5jwAAAAAAAAAAAAAAAAAAAAAAOiHfNLS9fyefP5342n+H84Hap2v86iZH4vTY9muHQAAAAAAAAAAAAAAAAAAAAbFxt17a+VqtXKnVdxaWD3ZeecQF7vzj18MQBv/X/HqeeXdsxvXF3ua/O39QPS8/+Lq/T/MeTkIHf69mHxaKL/e/Pil11TWTyYAAAAAAAAAAAAAAAAAABg+7Y9+s+4EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALLT/v9/34pPs5MzWS8TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAh9z0AAP//RNm0Fg==") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:00 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:00 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$eJzs3bFrE1EcB/BfbdXikiJCQRwOXJxCW+ieIhXEgNISpCJitCmUJhQsBBRs3QQHN0dHN1FwcfOPEHQVHcTR4tKhEDEnSSNRYyG92Hw+y/24977we8s9brh3N8/U1pbXN1a2tz/H+PhIjBWiEDsjMRFHYjRSDwIAOEx2Go342khl3QsAcDDs/wAwfHrc/68cYEsAQJ/t//3/ydKbD+VKYbZfnQEA/bK4dO3SXLE4v5Ak4xG1h/VSvZRe0/G5lViNalRiKnKxG9FoSesLF4vzU0nTRJRqWz/zW/XSaGd+OnIx0T0/neaTzvzROLE3PxO5ONU9P9M1fyzOnd2Tz0cu3t6O9ajGcvzItvOb00ly/nLxl/zx5jwAAAAAAAAAAAAAAAAAAAAAAOiHfNLS9fyefP5342n+H84Hap2v86iZH4vTY9muHQAAAAAAAAAAAAAAAAAAAAbFxt17a+VqtXKnVdxaWD3ZeecQF7vzj18MQBv/X/HqeeXdsxvXF3ua/O39QPS8/+Lq/T/MeTkIHf69mHxaKL/e/Pil11TWTyYAAAAAAAAAAAAAAAAAABg+7Y9+s+4EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALLT/v9/34pPs5MzWS8TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAh9z0AAP//RNm0Fg==") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:00 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:01 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="696f636861727365743d6d61636761656c69632c726f6469722c73686f72746e616d653d6d697865642c73686f72746e616d653d6c6f7765722c756e695f786c6174653d302c757466383d312c636865636b3d7374726963742c576e695f786c6174653d302c757365667265652c747a3d5554432c64656275672c73686f72746e616d653d6d697865642c73686f72746e616d653d77696e39352c756e695f786c6174653d312c726f6469722c756e695f78c46174653d312c696f636861727365743d61736369692c756e6947786c6174653d302c646d61736b3d30303030303030303030303030303030303230303030302c696f636861727365743d63703836302c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:02 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:03 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:03 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$eJzs3bFrE1EcB/BfbdXikiJCQRwOXJxCW+ieIhXEgNISpCJitCmUJhQsBBRs3QQHN0dHN1FwcfOPEHQVHcTR4tKhEDEnSSNRYyG92Hw+y/24977we8s9brh3N8/U1pbXN1a2tz/H+PhIjBWiEDsjMRFHYjRSDwIAOEx2Go342khl3QsAcDDs/wAwfHrc/68cYEsAQJ/t//3/ydKbD+VKYbZfnQEA/bK4dO3SXLE4v5Ak4xG1h/VSvZRe0/G5lViNalRiKnKxG9FoSesLF4vzU0nTRJRqWz/zW/XSaGd+OnIx0T0/neaTzvzROLE3PxO5ONU9P9M1fyzOnd2Tz0cu3t6O9ajGcvzItvOb00ly/nLxl/zx5jwAAAAAAAAAAAAAAAAAAAAAAOiHfNLS9fyefP5342n+H84Hap2v86iZH4vTY9muHQAAAAAAAAAAAAAAAAAAAAbFxt17a+VqtXKnVdxaWD3ZeecQF7vzj18MQBv/X/HqeeXdsxvXF3ua/O39QPS8/+Lq/T/MeTkIHf69mHxaKL/e/Pil11TWTyYAAAAAAAAAAAAAAAAAABg+7Y9+s+4EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALLT/v9/34pPs5MzWS8TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAh9z0AAP//RNm0Fg==") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:03 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:03 executing program 5: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$eJzs3bFrE1EcB/BfbdXikiJCQRwOXJxCW+ieIhXEgNISpCJitCmUJhQsBBRs3QQHN0dHN1FwcfOPEHQVHcTR4tKhEDEnSSNRYyG92Hw+y/24977we8s9brh3N8/U1pbXN1a2tz/H+PhIjBWiEDsjMRFHYjRSDwIAOEx2Go342khl3QsAcDDs/wAwfHrc/68cYEsAQJ/t//3/ydKbD+VKYbZfnQEA/bK4dO3SXLE4v5Ak4xG1h/VSvZRe0/G5lViNalRiKnKxG9FoSesLF4vzU0nTRJRqWz/zW/XSaGd+OnIx0T0/neaTzvzROLE3PxO5ONU9P9M1fyzOnd2Tz0cu3t6O9ajGcvzItvOb00ly/nLxl/zx5jwAAAAAAAAAAAAAAAAAAAAAAOiHfNLS9fyefP5342n+H84Hap2v86iZH4vTY9muHQAAAAAAAAAAAAAAAAAAAAbFxt17a+VqtXKnVdxaWD3ZeecQF7vzj18MQBv/X/HqeeXdsxvXF3ua/O39QPS8/+Lq/T/MeTkIHf69mHxaKL/e/Pil11TWTyYAAAAAAAAAAAAAAAAAABg+7Y9+s+4EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALLT/v9/34pPs5MzWS8TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAh9z0AAP//RNm0Fg==") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:03 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004364ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = epoll_create1(0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x20000004}) 15:41:03 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:03 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004364ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = epoll_create1(0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x20000004}) 15:41:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004364ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = epoll_create1(0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x20000004}) 15:41:06 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:06 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004364ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = epoll_create1(0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x20000004}) 15:41:06 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access', 0x3d, r4}}], [], 0x6b}}) 15:41:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f00000000c0)) 15:41:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:06 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access', 0x3d, r4}}], [], 0x6b}}) [ 252.997756][T13798] 9p: Unknown uid 00000000004294967295 15:41:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004364ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = epoll_create1(0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x20000004}) 15:41:06 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) [ 253.058649][ T23] audit: type=1326 audit(1681918866.367:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 15:41:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') [ 253.110390][T13805] 9p: Unknown uid 00000000004294967295 15:41:06 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004364ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = epoll_create1(0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x20000004}) 15:41:06 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access', 0x3d, r4}}], [], 0x6b}}) 15:41:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') [ 253.425289][ T23] audit: type=1326 audit(1681918866.377:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 [ 253.447641][T13819] 9p: Unknown uid 00000000004294967295 [ 253.449417][ T23] audit: type=1326 audit(1681918866.407:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 [ 253.478772][ T23] audit: type=1326 audit(1681918866.407:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 [ 253.502741][ T23] audit: type=1326 audit(1681918866.407:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 [ 253.526652][ T23] audit: type=1326 audit(1681918866.407:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 [ 253.550611][ T23] audit: type=1326 audit(1681918866.407:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=80 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 [ 253.574496][ T23] audit: type=1326 audit(1681918866.407:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 [ 253.598381][ T23] audit: type=1326 audit(1681918866.407:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=87 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 [ 253.622209][ T23] audit: type=1326 audit(1681918866.407:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13800 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4c8137169 code=0x7ffc0000 15:41:07 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002940)='./file0\x00', &(0x7f0000000040)='esdfs\x00', 0x16, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0xc4) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000007c0)) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r6 = socket$inet6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='veth1_virt_wifi\x00', 0x10) connect$inet6(r6, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000100), 0x40000c4, 0x0) r7 = getpgrp(r3) syz_clone3(&(0x7f0000002880)={0x8001200, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x3c}, &(0x7f00000017c0)=""/4096, 0x1000, &(0x7f00000027c0)=""/76, &(0x7f0000002840)=[r7], 0x1, {r0}}, 0x58) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000100)='./bus\x00', 0x840, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="2c6673686174697350f0628fe41633c896af294969672c6673636f6e74657800000000000000000000a616001c0000000000000000000c5c4a37e50cd54a00000000"], 0xff, 0x20e, &(0x7f0000000400)="$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") syz_clone(0x42048480, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:07 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access', 0x3d, r4}}], [], 0x6b}}) 15:41:07 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004364ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = epoll_create1(0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)={0x20000004}) 15:41:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:07 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:07 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:07 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) [ 253.857700][T13831] 9p: Unknown uid 00000000004294967295 15:41:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000005c0)={@random="bdff4f0990c6", @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "0654a5", 0x0, 0x6c, 0x0, @mcast2, @loopback, [], "6ede9b3d2db37c86"}}}}}}}, 0x0) 15:41:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x21, &(0x7f0000000200)={0x0, 0xffd8}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/184, 0xb8}], 0x1, 0x0, 0x0) 15:41:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000080)=[{0x14}, {0x15}, {0x6}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) 15:41:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x3e, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 15:41:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000005c0)={@random="bdff4f0990c6", @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "0654a5", 0x0, 0x6c, 0x0, @mcast2, @loopback, [], "6ede9b3d2db37c86"}}}}}}}, 0x0) 15:41:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000240)=[{0x3}, {0x16}]}) 15:41:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="680000000007010100000000000000000a00000a090001007379"], 0x68}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, 0x3, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x81}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x48}]}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xd70c}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24004840}, 0x4004000) 15:41:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') unlink(&(0x7f00000004c0)='./file0\x00') 15:41:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000005c0)={@random="bdff4f0990c6", @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "0654a5", 0x0, 0x6c, 0x0, @mcast2, @loopback, [], "6ede9b3d2db37c86"}}}}}}}, 0x0) 15:41:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x3e, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) [ 254.835675][T13884] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. [ 254.860829][T13890] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 15:41:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000005c0)={@random="bdff4f0990c6", @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "0654a5", 0x0, 0x6c, 0x0, @mcast2, @loopback, [], "6ede9b3d2db37c86"}}}}}}}, 0x0) 15:41:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="680000000007010100000000000000000a00000a090001007379"], 0x68}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, 0x3, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x81}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x48}]}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xd70c}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24004840}, 0x4004000) 15:41:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="680000000007010100000000000000000a00000a090001007379"], 0x68}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, 0x3, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x81}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x48}]}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xd70c}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24004840}, 0x4004000) 15:41:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000240)=[{0x3}, {0x16}]}) [ 254.901014][T13895] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. [ 254.929181][T13902] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 254.941535][T13901] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 15:41:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000080)=[{0x14}, {0x15}, {0x6}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) 15:41:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) set_mempolicy(0x1, &(0x7f0000000080)=0x5, 0x800) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x2, 0xf, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@empty, @in6=@private2}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_sec_ctx={0x1}]}, 0x88}}, 0x0) 15:41:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x3e, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 15:41:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="680000000007010100000000000000000a00000a090001007379"], 0x68}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, 0x3, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x81}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x48}]}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xd70c}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24004840}, 0x4004000) 15:41:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="680000000007010100000000000000000a00000a090001007379"], 0x68}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, 0x3, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x81}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x48}]}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xd70c}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24004840}, 0x4004000) 15:41:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000240)=[{0x3}, {0x16}]}) 15:41:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) set_mempolicy(0x1, &(0x7f0000000080)=0x5, 0x800) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x2, 0xf, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@empty, @in6=@private2}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_sec_ctx={0x1}]}, 0x88}}, 0x0) 15:41:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="680000000007010100000000000000000a00000a090001007379"], 0x68}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, 0x3, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x81}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x48}]}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xd70c}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24004840}, 0x4004000) 15:41:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x3e, r1, 0x1, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 15:41:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="680000000007010100000000000000000a00000a090001007379"], 0x68}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, 0x3, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x81}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x48}]}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xd70c}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x100}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0xcc}, 0x1, 0x0, 0x0, 0x24004840}, 0x4004000) 15:41:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) set_mempolicy(0x1, &(0x7f0000000080)=0x5, 0x800) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x2, 0xf, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@empty, @in6=@private2}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_sec_ctx={0x1}]}, 0x88}}, 0x0) [ 255.685076][T13911] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 255.685123][T13912] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 255.704267][T13913] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. 15:41:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000240)=[{0x3}, {0x16}]}) [ 255.747831][T13921] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 255.760722][T13925] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 15:41:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) set_mempolicy(0x1, &(0x7f0000000080)=0x5, 0x800) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x2, 0xf, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@empty, @in6=@private2}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_sec_ctx={0x1}]}, 0x88}}, 0x0) 15:41:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000080)=[{0x14}, {0x15}, {0x6}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) 15:41:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x633, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev}, {@in, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x7, 0x0, 0x0, @in=@empty}}]}, 0x154}}, 0x0) 15:41:09 executing program 3: r0 = syz_io_uring_setup(0x27c4, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000080)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0, 0x20000000}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:41:09 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000204be04020506056402040c430009003f0020000a0000000d0085a168d0bf46d32345653600648d270005000a00000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a32000400160005000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0xa00000000000000) 15:41:09 executing program 1: unshare(0xa000400) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x7}, 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:41:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x633, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev}, {@in, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x7, 0x0, 0x0, @in=@empty}}]}, 0x154}}, 0x0) 15:41:09 executing program 3: r0 = syz_io_uring_setup(0x27c4, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000080)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0, 0x20000000}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:41:09 executing program 1: unshare(0xa000400) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x7}, 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:41:09 executing program 0: unshare(0xa000400) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x7}, 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:41:09 executing program 3: r0 = syz_io_uring_setup(0x27c4, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000080)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0, 0x20000000}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:41:09 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000204be04020506056402040c430009003f0020000a0000000d0085a168d0bf46d32345653600648d270005000a00000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a32000400160005000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0xa00000000000000) 15:41:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x633, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev}, {@in, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x7, 0x0, 0x0, @in=@empty}}]}, 0x154}}, 0x0) [ 256.558708][T13936] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 256.602990][T13947] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 15:41:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000080)=[{0x14}, {0x15}, {0x6}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) 15:41:10 executing program 0: unshare(0xa000400) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x7}, 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:41:10 executing program 3: r0 = syz_io_uring_setup(0x27c4, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000080)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0, 0x20000000}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 15:41:10 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000204be04020506056402040c430009003f0020000a0000000d0085a168d0bf46d32345653600648d270005000a00000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a32000400160005000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0xa00000000000000) 15:41:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x633, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev}, {@in, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x7, 0x0, 0x0, @in=@empty}}]}, 0x154}}, 0x0) 15:41:10 executing program 1: unshare(0xa000400) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x7}, 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:41:10 executing program 1: unshare(0xa000400) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x7}, 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:41:10 executing program 0: unshare(0xa000400) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x7}, 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 15:41:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:10 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000204be04020506056402040c430009003f0020000a0000000d0085a168d0bf46d32345653600648d270005000a00000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a32000400160005000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0xa00000000000000) 15:41:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) 15:41:10 executing program 1: r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000100)="ee", 0x1}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0xff00) [ 257.419785][T13960] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 257.459059][T13971] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 15:41:11 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:11 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) listen(r0, 0x3) poll(&(0x7f00000003c0)=[{r0}], 0x1, 0x0) 15:41:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) 15:41:11 executing program 1: r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000100)="ee", 0x1}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0xff00) 15:41:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:11 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) listen(r0, 0x3) poll(&(0x7f00000003c0)=[{r0}], 0x1, 0x0) 15:41:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) 15:41:11 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:11 executing program 1: r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000100)="ee", 0x1}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0xff00) 15:41:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:11 executing program 1: r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000100)="ee", 0x1}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0xff00) 15:41:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}}, 0x0) 15:41:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:11 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:11 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) listen(r0, 0x3) poll(&(0x7f00000003c0)=[{r0}], 0x1, 0x0) 15:41:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) write$tcp_mem(r0, &(0x7f0000000000)={0x500000000000000, 0xa, 0x0, 0x20, 0x0, 0x2c}, 0x48) 15:41:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 15:41:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4}, 0x10}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8aa25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce0eb3d24c802e2a307a41857c5fc4bc5a711e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB='xo\x00'], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={@rand_addr, 0x0, 0x29, 0x20, 0x9}}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYBLOB="010000000000000000002000000009001f007068794e99"], 0x20}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x3efbf3a61ea3b617, 0x70bd28, 0x25dfdbfb}, 0x14}}, 0x4004840) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x44045}, 0x4000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bac36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091c6ece6f6d90fdfae31b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e2740739848177742b456a1c0f9586fd800"/161, @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a80)=@newlink={0xa8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x78, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x68, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x7b}}]}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x81, 0x7}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0xa8}}, 0x0) 15:41:11 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) listen(r0, 0x3) poll(&(0x7f00000003c0)=[{r0}], 0x1, 0x0) 15:41:11 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x20830, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x163) 15:41:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@datasec={0x4, 0x0, 0x0, 0xf, 0x2, [], '\x00p'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '5'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'e'}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000340)=""/4096, 0x47, 0x1000, 0x1}, 0x20) 15:41:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r1, 0x8e0f4fb8fa25860b, 0x0, 0x0, {}, [@NL802154_ATTR_CHANNEL={0x5}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PAGE={0x5}]}, 0x2c}}, 0x0) 15:41:11 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=""/102400, 0x19000}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x525, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 15:41:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 15:41:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@datasec={0x4, 0x0, 0x0, 0xf, 0x2, [], '\x00p'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '5'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'e'}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000340)=""/4096, 0x47, 0x1000, 0x1}, 0x20) 15:41:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 15:41:11 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@datasec={0x4, 0x0, 0x0, 0xf, 0x2, [], '\x00p'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '5'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'e'}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000340)=""/4096, 0x47, 0x1000, 0x1}, 0x20) 15:41:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x4c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCB={0x5}, @IFLA_MACSEC_REPLAY_PROTECT={0x5, 0xc, 0x1d}, @IFLA_MACSEC_ES={0x5}]}}}]}, 0x4c}}, 0x0) [ 258.433205][T14023] vlan3: entered promiscuous mode [ 258.447536][T14023] bond0: entered promiscuous mode [ 258.452644][T14023] bond_slave_0: entered promiscuous mode [ 258.458448][T14023] bond_slave_1: entered promiscuous mode [ 258.489667][T14023] bond0: left promiscuous mode [ 258.494525][T14023] bond_slave_0: left promiscuous mode [ 258.500103][T14023] bond_slave_1: left promiscuous mode 15:41:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 15:41:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@datasec={0x4, 0x0, 0x0, 0xf, 0x2, [], '\x00p'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '5'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'e'}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000340)=""/4096, 0x47, 0x1000, 0x1}, 0x20) 15:41:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x4c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCB={0x5}, @IFLA_MACSEC_REPLAY_PROTECT={0x5, 0xc, 0x1d}, @IFLA_MACSEC_ES={0x5}]}}}]}, 0x4c}}, 0x0) 15:41:11 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=""/102400, 0x19000}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x525, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) [ 258.650832][T14039] cgroup: fork rejected by pids controller in /syz0 15:41:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4}, 0x10}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8aa25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce0eb3d24c802e2a307a41857c5fc4bc5a711e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB='xo\x00'], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={@rand_addr, 0x0, 0x29, 0x20, 0x9}}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYBLOB="010000000000000000002000000009001f007068794e99"], 0x20}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x3efbf3a61ea3b617, 0x70bd28, 0x25dfdbfb}, 0x14}}, 0x4004840) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x44045}, 0x4000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bac36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091c6ece6f6d90fdfae31b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e2740739848177742b456a1c0f9586fd800"/161, @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a80)=@newlink={0xa8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x78, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x68, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x7b}}]}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x81, 0x7}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0xa8}}, 0x0) 15:41:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4}, 0x10}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8aa25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce0eb3d24c802e2a307a41857c5fc4bc5a711e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB='xo\x00'], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={@rand_addr, 0x0, 0x29, 0x20, 0x9}}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYBLOB="010000000000000000002000000009001f007068794e99"], 0x20}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x3efbf3a61ea3b617, 0x70bd28, 0x25dfdbfb}, 0x14}}, 0x4004840) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000008c0)=ANY=[@ANYBLOB="1440ac972e3cd62fa4e98f01324e8e0026bd7000fedbdf2500cb35e6180458331f9517026d03973f260cb6d966ea8b11e290b2b95ee71639368d804761d4b7d6a0c70251b63b1070c494e5cc8a671b311bc171630e8933dfb0b9f166b7096150b7ff222950cda6eff060936738f8064d2a18b9550367b3fe54d48f844e99ff2de62d00571661d80a65f47b6d356f270d8856e397c8c4748205228513af307ead68d0e21dbd38fe45b95e61f6b44df7cd253c1e6a28c1bf4d98b5eddb5c19e58855f6c5205610e8af2c10a8c1a7658dc456dbec07af3c08329b93c95f49729b703d705395ea41150ee720d57831e74fb33d8403e503215a3aaf78d749844f467adc5bfebb4f7f707c39d36799cc12921ccb54758485d7920af8244fad1a99a6581e814e17655c576391115d91fbd8db46ecdf61d7939084ce75b937fce76ae068fdc693c15f5a4833cd11eff8cae373b0c52a658760efb3eeb34fb191f28a1fbf5c59bb5ce7455d261359e20c3f94c7d374d6bbadc838b047d487fc45ea2a022d90"], 0x14}, 0x1, 0x0, 0x0, 0x44045}, 0x4000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bac36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091c6ece6f6d90fdfae31b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e2740739848177742b456a1c0f9586fd800"/161, @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a80)=@newlink={0xa8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x78, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x68, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x7b}}]}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x81, 0x7}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0xa8}}, 0x0) 15:41:12 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=""/102400, 0x19000}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x525, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 15:41:12 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=""/102400, 0x19000}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x525, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) [ 258.914577][T15769] vlan3: entered promiscuous mode [ 258.922600][T15769] bond0: entered promiscuous mode [ 258.927665][T15769] bond_slave_0: entered promiscuous mode [ 258.933544][T15769] bond_slave_1: entered promiscuous mode [ 258.944492][T15769] bond0: left promiscuous mode [ 258.949305][T15769] bond_slave_0: left promiscuous mode [ 258.954880][T15769] bond_slave_1: left promiscuous mode 15:41:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x4c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCB={0x5}, @IFLA_MACSEC_REPLAY_PROTECT={0x5, 0xc, 0x1d}, @IFLA_MACSEC_ES={0x5}]}}}]}, 0x4c}}, 0x0) [ 259.041961][T16062] vlan3: entered promiscuous mode [ 259.052816][T16062] bond0: entered promiscuous mode [ 259.057902][T16062] bond_slave_0: entered promiscuous mode [ 259.063729][T16062] bond_slave_1: entered promiscuous mode [ 259.151097][T16062] bond0: left promiscuous mode [ 259.156049][T16062] bond_slave_0: left promiscuous mode [ 259.161560][T16062] bond_slave_1: left promiscuous mode 15:41:12 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=""/102400, 0x19000}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x525, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 15:41:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4}, 0x10}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8aa25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce0eb3d24c802e2a307a41857c5fc4bc5a711e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB='xo\x00'], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={@rand_addr, 0x0, 0x29, 0x20, 0x9}}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYBLOB="010000000000000000002000000009001f007068794e99"], 0x20}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x3efbf3a61ea3b617, 0x70bd28, 0x25dfdbfb}, 0x14}}, 0x4004840) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x44045}, 0x4000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bac36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091c6ece6f6d90fdfae31b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e2740739848177742b456a1c0f9586fd800"/161, @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a80)=@newlink={0xa8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x78, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x68, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x7b}}]}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x81, 0x7}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0xa8}}, 0x0) 15:41:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x4c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCB={0x5}, @IFLA_MACSEC_REPLAY_PROTECT={0x5, 0xc, 0x1d}, @IFLA_MACSEC_ES={0x5}]}}}]}, 0x4c}}, 0x0) 15:41:12 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=""/102400, 0x19000}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x525, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 15:41:12 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4}, 0x10}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8aa25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce0eb3d24c802e2a307a41857c5fc4bc5a711e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB='xo\x00'], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={@rand_addr, 0x0, 0x29, 0x20, 0x9}}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYBLOB="010000000000000000002000000009001f007068794e99"], 0x20}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x3efbf3a61ea3b617, 0x70bd28, 0x25dfdbfb}, 0x14}}, 0x4004840) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x44045}, 0x4000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bac36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091c6ece6f6d90fdfae31b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e2740739848177742b456a1c0f9586fd800"/161, @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a80)=@newlink={0xa8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x78, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x68, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x7b}}]}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x81, 0x7}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0xa8}}, 0x0) [ 259.370931][T19286] vlan3: entered promiscuous mode [ 259.377769][T19286] bond0: entered promiscuous mode [ 259.382877][T19286] bond_slave_0: entered promiscuous mode [ 259.388548][T19286] bond_slave_1: entered promiscuous mode [ 259.444103][T19286] bond0: left promiscuous mode [ 259.449056][T19286] bond_slave_0: left promiscuous mode [ 259.454642][T19286] bond_slave_1: left promiscuous mode 15:41:12 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:12 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=""/102400, 0x19000}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x525, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) [ 259.553819][T19294] vlan3: entered promiscuous mode [ 259.628686][T19294] bond0: entered promiscuous mode [ 259.633921][T19294] bond_slave_0: entered promiscuous mode [ 259.639727][T19294] bond_slave_1: entered promiscuous mode [ 259.721645][T19294] bond0: left promiscuous mode [ 259.726470][T19294] bond_slave_0: left promiscuous mode [ 259.732014][T19294] bond_slave_1: left promiscuous mode [ 260.620174][T20779] cgroup: fork rejected by pids controller in /syz4 15:41:14 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:14 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:14 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:14 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4}, 0x10}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8aa25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce0eb3d24c802e2a307a41857c5fc4bc5a711e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB='xo\x00'], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={@rand_addr, 0x0, 0x29, 0x20, 0x9}}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYBLOB="010000000000000000002000000009001f007068794e99"], 0x20}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x3efbf3a61ea3b617, 0x70bd28, 0x25dfdbfb}, 0x14}}, 0x4004840) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000008c0)=ANY=[@ANYBLOB="1440ac972e3cd62fa4e98f01324e8e0026bd7000fedbdf2500cb35e6180458331f9517026d03973f260cb6d966ea8b11e290b2b95ee71639368d804761d4b7d6a0c70251b63b1070c494e5cc8a671b311bc171630e8933dfb0b9f166b7096150b7ff222950cda6eff060936738f8064d2a18b9550367b3fe54d48f844e99ff2de62d00571661d80a65f47b6d356f270d8856e397c8c4748205228513af307ead68d0e21dbd38fe45b95e61f6b44df7cd253c1e6a28c1bf4d98b5eddb5c19e58855f6c5205610e8af2c10a8c1a7658dc456dbec07af3c08329b93c95f49729b703d705395ea41150ee720d57831e74fb33d8403e503215a3aaf78d749844f467adc5bfebb4f7f707c39d36799cc12921ccb54758485d7920af8244fad1a99a6581e814e17655c576391115d91fbd8db46ecdf61d7939084ce75b937fce76ae068fdc693c15f5a4833cd11eff8cae373b0c52a658760efb3eeb34fb191f28a1fbf5c59bb5ce7455d261359e20c3f94c7d374d6bbadc838b047d487fc45ea2a022d90"], 0x14}, 0x1, 0x0, 0x0, 0x44045}, 0x4000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bac36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091c6ece6f6d90fdfae31b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e2740739848177742b456a1c0f9586fd800"/161, @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a80)=@newlink={0xa8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x78, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x68, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x7b}}]}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x81, 0x7}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0xa8}}, 0x0) 15:41:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4}, 0x10}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8aa25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce0eb3d24c802e2a307a41857c5fc4bc5a711e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB='xo\x00'], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={@rand_addr, 0x0, 0x29, 0x20, 0x9}}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYRES16=r7, @ANYBLOB="010000000000000000002000000009001f007068794e99"], 0x20}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x3efbf3a61ea3b617, 0x70bd28, 0x25dfdbfb}, 0x14}}, 0x4004840) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x44045}, 0x4000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bac36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091c6ece6f6d90fdfae31b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e2740739848177742b456a1c0f9586fd800"/161, @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a80)=@newlink={0xa8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x78, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x68, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x7b}}]}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x81, 0x7}}]}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0xa8}}, 0x0) [ 262.445228][T21777] vlan3: entered promiscuous mode [ 262.451367][T21777] bond0: entered promiscuous mode [ 262.456484][T21777] bond_slave_0: entered promiscuous mode [ 262.462262][T21777] bond_slave_1: entered promiscuous mode [ 262.468522][T21777] bond0: left promiscuous mode [ 262.473339][T21777] bond_slave_0: left promiscuous mode [ 262.478789][T21777] bond_slave_1: left promiscuous mode 15:41:16 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:16 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:16 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) [ 264.397261][T21779] vlan3: entered promiscuous mode [ 264.437355][T21779] bond0: entered promiscuous mode [ 264.443157][T21779] bond_slave_0: entered promiscuous mode [ 264.448884][T21779] bond_slave_1: entered promiscuous mode [ 264.459237][T21779] bond0: left promiscuous mode [ 264.464135][T21779] bond_slave_0: left promiscuous mode [ 264.469690][T21779] bond_slave_1: left promiscuous mode 15:41:17 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:17 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) [ 264.673478][T21833] cgroup: fork rejected by pids controller in /syz3 15:41:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) [ 265.997544][T22056] ================================================================== [ 266.005677][T22056] BUG: KCSAN: data-race in io_wq_worker_running / io_wqe_activate_free_worker [ 266.014509][T22056] [ 266.016831][T22056] write to 0xffff8881244c99c4 of 4 bytes by task 22083 on cpu 0: [ 266.024523][T22056] io_wq_worker_running+0x64/0xa0 [ 266.029536][T22056] schedule_timeout+0xcc/0x230 [ 266.034293][T22056] io_wqe_worker+0x4bd/0x8a0 [ 266.038864][T22056] ret_from_fork+0x1f/0x30 [ 266.043289][T22056] [ 266.045599][T22056] read to 0xffff8881244c99c4 of 4 bytes by task 22056 on cpu 1: [ 266.053227][T22056] io_wqe_activate_free_worker+0xf4/0x270 [ 266.058944][T22056] io_wqe_enqueue+0x268/0x470 [ 266.063605][T22056] io_wq_enqueue+0x35/0x40 [ 266.068018][T22056] io_queue_iowq+0x1d1/0x310 [ 266.072654][T22056] io_req_task_submit+0xf4/0x130 [ 266.077603][T22056] tctx_task_work+0x1fe/0x4d0 [ 266.082277][T22056] task_work_run+0x123/0x160 [ 266.086864][T22056] get_signal+0xe64/0xff0 [ 266.091196][T22056] arch_do_signal_or_restart+0x89/0x2a0 [ 266.096729][T22056] exit_to_user_mode_loop+0x6f/0xe0 [ 266.101939][T22056] exit_to_user_mode_prepare+0x6c/0xb0 [ 266.108438][T22056] syscall_exit_to_user_mode+0x26/0x140 [ 266.113994][T22056] do_syscall_64+0x4d/0xc0 [ 266.118391][T22056] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 266.124274][T22056] [ 266.126586][T22056] value changed: 0x00000005 -> 0x00000003 [ 266.132287][T22056] [ 266.134610][T22056] Reported by Kernel Concurrency Sanitizer on: [ 266.140742][T22056] CPU: 1 PID: 22056 Comm: syz-executor.0 Not tainted 6.3.0-rc7-syzkaller-00060-g789b4a41c247 #0 [ 266.151142][T22056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 [ 266.161181][T22056] ================================================================== 15:41:19 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:19 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f00000006c0), 0x4) 15:41:19 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5416, 0x200000000000000) 15:41:20 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x17}}]}, 0x88}}, 0x0) 15:41:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x12}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) 15:41:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x12}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) 15:41:20 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x17}}]}, 0x88}}, 0x0) [ 267.438074][T22400] __nla_validate_parse: 1 callbacks suppressed [ 267.438089][T22400] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 15:41:21 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x12}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) [ 268.166758][T22435] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. [ 268.202081][T22318] cgroup: fork rejected by pids controller in /syz2 15:41:21 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:21 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x400, 0x82) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000100)={r0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f2b3cc0b2c9f63cc598995022dca1ce7f493524e401b38864ca0fc8b06997f59d20df7e91f9ab4263d919380afca27960fecc938ac9b72913a0e13f3251d7591", "dc8548c2db2dd724d03c3d3158bff846743a551da04c991ab5f37b3efa45c7f780a0837682ddfd0d91428c6d3d34ded8ee15d7d7a2ad0d891df37a04e4d74309", "95329917d888df350602f50699b30155c7537af51b24443907e5e66d94a40101"}}) 15:41:22 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x17}}]}, 0x88}}, 0x0) 15:41:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x12}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff66}, 0x48) 15:41:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @private1}, @in={0x2, 0x0, @local}}, @sadb_x_nat_t_port={0x1, 0x3}]}, 0x50}}, 0x0) 15:41:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 15:41:22 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x57) [ 269.440292][T23162] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 15:41:22 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in=@loopback}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 15:41:22 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x17}}]}, 0x88}}, 0x0) 15:41:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @private1}, @in={0x2, 0x0, @local}}, @sadb_x_nat_t_port={0x1, 0x3}]}, 0x50}}, 0x0) [ 269.633904][T23197] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. [ 269.669171][T23159] cgroup: fork rejected by pids controller in /syz5 15:41:23 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:23 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x57) 15:41:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in=@loopback}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 15:41:23 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x57) 15:41:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @private1}, @in={0x2, 0x0, @local}}, @sadb_x_nat_t_port={0x1, 0x3}]}, 0x50}}, 0x0) 15:41:23 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000001ec0)=""/4096, 0x1000}], 0x1, 0x1609, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x61, 0x0, 0x0, 0x0, 0x0, 0xaae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_io_uring_setup(0x392b, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r2, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) r3 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000003000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000000380), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x340a, 0xa, 0x0, 0x0) io_uring_enter(r3, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x1217]}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newlinkprop={0x34, 0x6c, 0x8, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, 0x201, 0x1000}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'vxcan1\x00'}]}, 0x34}}, 0x20044080) r7 = socket(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x4, &(0x7f0000000280)={0x7, {{0x2, 0x0, @rand_addr=0x64010102}}, {{0x2, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f00000003c0)=""/4096) syncfs(0xffffffffffffffff) 15:41:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in=@loopback}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 15:41:24 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x57) 15:41:24 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x57) 15:41:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, 0x0, 0x0, 0x20060}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) 15:41:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in=@loopback}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 15:41:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, 0x0, 0x0, 0x20060}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) 15:41:24 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @private1}, @in={0x2, 0x0, @local}}, @sadb_x_nat_t_port={0x1, 0x3}]}, 0x50}}, 0x0) 15:41:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x6bf1c2d5adbaed32}) write$tun(r0, &(0x7f0000000280)={@void, @void, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x65, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}}}}, 0x30) 15:41:24 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x57) 15:41:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) 15:41:24 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x57) 15:41:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:24 executing program 5: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0x96, &(0x7f00000002c0)=""/150, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x32}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r3}, 0x10) 15:41:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) 15:41:24 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000000), 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000040)='wg0\x00', 0x4) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 15:41:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, 0x0, 0x0, 0x20060}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) 15:41:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) ioctl$TIOCSLCKTRMIOS(r0, 0x5434, 0x0) 15:41:24 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x20, 0x1418, 0x1, 0x0, 0x0, "", [{{0x8}, {0xc}}]}, 0x20}}, 0x0) 15:41:24 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000000), 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000040)='wg0\x00', 0x4) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 15:41:24 executing program 5: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0x96, &(0x7f00000002c0)=""/150, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x32}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r3}, 0x10) [ 271.235447][ T23] kauditd_printk_skb: 136 callbacks suppressed [ 271.235459][ T23] audit: type=1400 audit(1681918884.549:745): avc: denied { bind } for pid=24452 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 15:41:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, 0x0, 0x0, 0x20060}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) [ 271.280598][T24462] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:41:24 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x20, 0x1418, 0x1, 0x0, 0x0, "", [{{0x8}, {0xc}}]}, 0x20}}, 0x0) 15:41:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:24 executing program 5: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0x96, &(0x7f00000002c0)=""/150, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x32}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r3}, 0x10) 15:41:24 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000000), 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000040)='wg0\x00', 0x4) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) [ 271.324200][ T23] audit: type=1400 audit(1681918884.579:746): avc: denied { setopt } for pid=24452 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 271.344322][ T23] audit: type=1400 audit(1681918884.579:747): avc: denied { ioctl } for pid=24452 comm="syz-executor.3" path="socket:[48407]" dev="sockfs" ino=48407 ioctlcmd=0x89ed scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 15:41:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) 15:41:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:24 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000000), 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000040)='wg0\x00', 0x4) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 15:41:24 executing program 5: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0x96, &(0x7f00000002c0)=""/150, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x32}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r3}, 0x10) 15:41:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000700000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) 15:41:24 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x20, 0x1418, 0x1, 0x0, 0x0, "", [{{0x8}, {0xc}}]}, 0x20}}, 0x0) [ 271.391924][T24475] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:41:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:24 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x20, 0x1418, 0x1, 0x0, 0x0, "", [{{0x8}, {0xc}}]}, 0x20}}, 0x0) [ 271.444754][T24489] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:41:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:24 executing program 5: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0x96, &(0x7f00000002c0)=""/150, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x32}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r3}, 0x10) 15:41:24 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000000), 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000040)='wg0\x00', 0x4) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) [ 271.497042][T24496] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:41:24 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000000), 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000040)='wg0\x00', 0x4) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 15:41:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:24 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000000), 0x10) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000040)='wg0\x00', 0x4) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 15:41:24 executing program 5: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0x96, &(0x7f00000002c0)=""/150, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x32}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r3}, 0x10) 15:41:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:24 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x700, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, 0x0) 15:41:25 executing program 5: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0x96, &(0x7f00000002c0)=""/150, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x32}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x4}]}, 0x3c}}, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r3}, 0x10) 15:41:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x7, 0x88b) syslog(0x4, &(0x7f0000000180)=""/109, 0x7f) 15:41:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8, 0x2, 0x2}]}}}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x50}, 0x1, 0x9}, 0x0) 15:41:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8, 0x2, 0x2}]}}}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x50}, 0x1, 0x9}, 0x0) 15:41:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8, 0x2, 0x2}]}}}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x50}, 0x1, 0x9}, 0x0) 15:41:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8, 0x2, 0x2}]}}}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x50}, 0x1, 0x9}, 0x0) 15:41:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x7, 0x88b) syslog(0x4, &(0x7f0000000180)=""/109, 0x7f) 15:41:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) listen(r0, 0xfff) r1 = accept(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x84) 15:41:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x4000) 15:41:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x7, 0x88b) syslog(0x4, &(0x7f0000000180)=""/109, 0x7f) 15:41:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='timerslack_ns\x00') lseek(r0, 0x1d7, 0x0) 15:41:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000040)=0x7, 0x88b) syslog(0x4, &(0x7f0000000180)=""/109, 0x7f) 15:41:25 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) close(0xffffffffffffffff) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000ac0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x12) 15:41:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x35}, {0x15, 0x0, 0x0, 0x800}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 15:41:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000280)=ANY=[], 0x11, 0x679, &(0x7f00000006c0)="$eJzs3d9uFNcZAPBvDVYsV0JVWyGECEyglUAiZncdjKxcVNv12J5kvbOaWUdwFaFiIsSSVpBKhatyQ1upfYjc9iHaJ6r6AL2gmtk1MfjPOkBsK/39Vvicnfn2nDPDaj4de/4EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABCN7kqz2WpEL+tv3k72110p8o0D1m+3969XRePgfiMa1b+Ym4tz40XnfvHd6rPVj8txYfzuQsxVxVw8+8nZn37689Mz258/YEBH4snTZw/vjkZbj497IMdkLe1nZZ5tdNbSJCvzZHlpqXljfbVMVrNeWt4ph+lG0i3SzjAvkqvda0lreXkxSRfu5Jv9tZVOL91eeOvjdrO5lHy2MEg7RZn3b3y2UHbXs14v66/VMdXqKuZW9UX8PBsmw7SzkST3H4y2FqcNsgpqHSaoPS2o3Wy3W612u7V0c/nmrWbz9K4FzTfErojj/9JyvN7/QRze0swk/0cvsujHZtyOZM9XN1aiiDw2dq+7VP2c2M7/v7qRHtjvzvy/neXPfbf6fNT5/+L43cX98v8+Y33vr19X3e+15kk8jWfxMO7GKEaxFY+PakQn5LUWafQjizLyyGIjOvWSZLIkieVYiqVoxpexHqtRRhKrkUUv0ijjTpQxjLT+RnWjiDQ6MYw8ikjianTjWiTRiuVYjsVIIo2FuBN5bEY/1mIlOnUr9+NBvd8XDxjjq6DWYYLaVX7eJ0j+592992M4vK2X2/kfAAAA+NFq1L99r+b/s/FhXVvNemnzuIcFAAAAvEf1X/4vVMVsVfswGub/AAAA8GPTqK+xa0TEfFwa17avhDrULwFcOQAAAAAnXz1/v1gV81XtUjS+3/wfAAAAOPn+Ul//P3fAPfb/NPig8c//RFHMNp4Pbv+y8ahTxXUenRo3cOrNFoer5xtnJo3UxdLpybtueqExufvlq5tg/ntS3J92r//GexhA/C0+Gsd8dG9c3tteM+5lfjXrpQvdvPdpKzqdMzPD9PbwD18/+GPUm//X/saZRtx/MNpa+O3vRvfqsTyvWnn+aHIaxK6zIQ4Yyzf1/Rbqay723OLZ+kKMSb/z436bO7d/Zvzxme/R54u4PI65PD8u51/f/rmqz9bCfls/GUXrHbf8RVwZx1y5emVc7DGK9rRRtHeO4q32xSFGsThtFIvvMopdgQBH5/6ULNTYnfjf4lh7NNn9RVwdx1w9Xx3E4/T5PY7ozWlH9OZhs1vEpPXXR/GPuDaOubYdvF+Orfr9+xtZ9dvqA9/W/SZ79Fv22o1qF5765tHv4+yTp88+fvDo7ldbX2193W4vLjU/aTZvtmO23oxJccD+AuD/1/Rn7EyNaHwyZVb9s1enFCz89+XLlzGKe3G9vtqgPuNgV6sfVDPxHachXJ8ya53f8YSX61NmdfM7HvRy+NjFI/ifAICjc/mAPHzY/H99yrz79Vx+0Ox4NnY+rQ0A+GGkxUxjfvjnRlFkgy9by8utznA9TYq8+3lSZCtraZL1h2nRXe/019JkUOTDvJv3qsoX2UpaJuXmYJAXw2Q1L5JBXma36ye/J5NHv5fpRqc/zLrloJd2yjTp5v1hpztMVrKymww2f9PLyvW0qD9cDtJutpp1O8Ms7ydlvll004UkKdN0R2C2kvaH2WpWVfvJoMg2OsWd5Iu8t7mRJitp2S2ywTAfN7jdV9ZfzYuNutmF497ZAHBCPHn67OHd0Wjr8Q9YOe5tBABeJ0sDAAAAAAAAAAAAAMDJdxTX/x2uMhsRJ2AYKioqD++OjvvIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC7/S8AAP//idZYIg==") open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 15:41:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x2) 15:41:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000280)=ANY=[], 0x11, 0x679, &(0x7f00000006c0)="$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") open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 15:41:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001180)=@delchain={0x24, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 272.169430][T24563] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 272.179694][T24563] CPU: 1 PID: 24563 Comm: syz-executor.4 Not tainted 6.3.0-rc7-syzkaller-00060-g789b4a41c247 #0 [ 272.190121][T24563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 [ 272.200261][T24563] Call Trace: [ 272.203534][T24563] [ 272.206692][T24563] dump_stack_lvl+0xda/0x130 [ 272.211276][T24563] dump_stack+0x15/0x20 [ 272.215627][T24563] dump_header+0x95/0x3c0 [ 272.220089][T24563] oom_kill_process+0xe3/0x3e0 [ 272.224863][T24563] out_of_memory+0x9f0/0xc30 [ 272.229547][T24563] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 272.235771][T24563] mem_cgroup_out_of_memory+0x139/0x190 [ 272.241351][T24563] memory_max_write+0x1e3/0x270 [ 272.246309][T24563] ? memory_max_show+0x70/0x70 [ 272.251079][T24563] cgroup_file_write+0x16b/0x310 [ 272.256016][T24563] ? __check_object_size+0x329/0x4e0 [ 272.261290][T24563] ? cgroup_seqfile_stop+0x70/0x70 [ 272.266406][T24563] kernfs_fop_write_iter+0x1ca/0x2b0 [ 272.271695][T24563] vfs_write+0x463/0x760 [ 272.275927][T24563] ksys_write+0xeb/0x1a0 [ 272.280193][T24563] __x64_sys_write+0x42/0x50 [ 272.284804][T24563] do_syscall_64+0x41/0xc0 [ 272.289306][T24563] ? irqentry_exit+0x12/0x40 [ 272.293976][T24563] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 272.299932][T24563] RIP: 0033:0x7f18128e9169 [ 272.304375][T24563] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 272.323979][T24563] RSP: 002b:00007f1811c5c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 272.332399][T24563] RAX: ffffffffffffffda RBX: 00007f1812a08f80 RCX: 00007f18128e9169 [ 272.340471][T24563] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 0000000000000006 [ 272.348442][T24563] RBP: 00007f1812944ca1 R08: 0000000000000000 R09: 0000000000000000 [ 272.356505][T24563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 272.364502][T24563] R13: 00007ffe24849ebf R14: 00007f1811c5c300 R15: 0000000000022000 [ 272.372555][T24563] [ 272.375645][T24563] memory: usage 12824kB, limit 0kB, failcnt 19 [ 272.381833][T24563] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 272.388677][T24563] Memory cgroup stats for /syz1: [ 272.389072][T24563] anon 106496 [ 272.389072][T24563] file 10448896 [ 272.389072][T24563] kernel 2576384 [ 272.389072][T24563] kernel_stack 32768 [ 272.389072][T24563] pagetables 77824 [ 272.389072][T24563] sec_pagetables 0 [ 272.389072][T24563] percpu 73616 [ 272.389072][T24563] sock 0 [ 272.389072][T24563] vmalloc 4096 [ 272.389072][T24563] shmem 10424320 [ 272.389072][T24563] file_mapped 106496 [ 272.389072][T24563] file_dirty 20480 [ 272.389072][T24563] file_writeback 0 [ 272.389072][T24563] swapcached 0 [ 272.389072][T24563] inactive_anon 106496 [ 272.389072][T24563] active_anon 10424320 [ 272.389072][T24563] inactive_file 12288 [ 272.389072][T24563] active_file 12288 [ 272.389072][T24563] unevictable 0 [ 272.389072][T24563] slab_reclaimable 193520 [ 272.389072][T24563] slab_unreclaimable 2162704 [ 272.389072][T24563] slab 2356224 [ 272.389072][T24563] workingset_refault_anon 0 [ 272.389072][T24563] workingset_refault_file 0 [ 272.389072][T24563] workingset_activate_anon 0 [ 272.389072][T24563] workingset_activate_file 0 [ 272.389072][T24563] workingset_restore_anon 0 [ 272.389072][T24563] workingset_restore_file 0 [ 272.389072][T24563] workingset_nodereclaim 0 [ 272.389072][T24563] pgscan 257 [ 272.389072][T24563] pgsteal 73 [ 272.389072][T24563] pgscan_kswapd 0 [ 272.389072][T24563] pgscan_direct 257 [ 272.389072][T24563] pgscan_khugepaged 0 [ 272.389072][T24563] pgsteal_kswapd 0 [ 272.389072][T24563] pgsteal_direct 73 [ 272.389072][T24563] pgsteal_khugepaged 0 [ 272.389072][T24563] pgfault 167910 [ 272.389072][T24563] pgmajfault 15 [ 272.389072][T24563] pgrefill 261 [ 272.389072][T24563] pgactivate 5695 [ 272.389072][T24563] pgdeactivate 270 [ 272.389072][T24563] pglazyfree 0 [ 272.389072][T24563] pglazyfreed 0 [ 272.554339][T24563] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=24558,uid=0 15:41:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x50}, {0x45, 0x0, 0x0, 0xfffffffe}, {0x6, 0x0, 0x0, 0x800000}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) [ 272.569696][T24563] Memory cgroup out of memory: Killed process 24558 (syz-executor.1) total-vm:46352kB, anon-rss:376kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:0 [ 272.591185][T24568] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=24568 comm=syz-executor.0 [ 272.605976][T24563] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 272.616114][T24563] CPU: 1 PID: 24563 Comm: syz-executor.4 Not tainted 6.3.0-rc7-syzkaller-00060-g789b4a41c247 #0 [ 272.619143][T24568] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 272.626521][T24563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 [ 272.626534][T24563] Call Trace: [ 272.626539][T24563] [ 272.626545][T24563] dump_stack_lvl+0xda/0x130 [ 272.656744][T24563] dump_stack+0x15/0x20 [ 272.661016][T24563] dump_header+0x95/0x3c0 [ 272.665435][T24563] oom_kill_process+0xe3/0x3e0 [ 272.670213][T24563] out_of_memory+0x9f0/0xc30 [ 272.674806][T24563] mem_cgroup_out_of_memory+0x139/0x190 [ 272.680343][T24563] memory_max_write+0x1e3/0x270 [ 272.685182][T24563] ? memory_max_show+0x70/0x70 [ 272.689934][T24563] cgroup_file_write+0x16b/0x310 [ 272.694871][T24563] ? __check_object_size+0x329/0x4e0 [ 272.700224][T24563] ? cgroup_seqfile_stop+0x70/0x70 [ 272.705332][T24563] kernfs_fop_write_iter+0x1ca/0x2b0 [ 272.710698][T24563] vfs_write+0x463/0x760 [ 272.715064][T24563] ksys_write+0xeb/0x1a0 [ 272.719307][T24563] __x64_sys_write+0x42/0x50 [ 272.723948][T24563] do_syscall_64+0x41/0xc0 [ 272.728347][T24563] ? irqentry_exit+0x12/0x40 [ 272.732939][T24563] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 272.738951][T24563] RIP: 0033:0x7f18128e9169 [ 272.743346][T24563] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 272.763106][T24563] RSP: 002b:00007f1811c5c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 15:41:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) listen(r0, 0xfff) r1 = accept(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x84) 15:41:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000280)=ANY=[], 0x11, 0x679, &(0x7f00000006c0)="$eJzs3d9uFNcZAPBvDVYsV0JVWyGECEyglUAiZncdjKxcVNv12J5kvbOaWUdwFaFiIsSSVpBKhatyQ1upfYjc9iHaJ6r6AL2gmtk1MfjPOkBsK/39Vvicnfn2nDPDaj4de/4EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABCN7kqz2WpEL+tv3k72110p8o0D1m+3969XRePgfiMa1b+Ym4tz40XnfvHd6rPVj8txYfzuQsxVxVw8+8nZn37689Mz258/YEBH4snTZw/vjkZbj497IMdkLe1nZZ5tdNbSJCvzZHlpqXljfbVMVrNeWt4ph+lG0i3SzjAvkqvda0lreXkxSRfu5Jv9tZVOL91eeOvjdrO5lHy2MEg7RZn3b3y2UHbXs14v66/VMdXqKuZW9UX8PBsmw7SzkST3H4y2FqcNsgpqHSaoPS2o3Wy3W612u7V0c/nmrWbz9K4FzTfErojj/9JyvN7/QRze0swk/0cvsujHZtyOZM9XN1aiiDw2dq+7VP2c2M7/v7qRHtjvzvy/neXPfbf6fNT5/+L43cX98v8+Y33vr19X3e+15kk8jWfxMO7GKEaxFY+PakQn5LUWafQjizLyyGIjOvWSZLIkieVYiqVoxpexHqtRRhKrkUUv0ijjTpQxjLT+RnWjiDQ6MYw8ikjianTjWiTRiuVYjsVIIo2FuBN5bEY/1mIlOnUr9+NBvd8XDxjjq6DWYYLaVX7eJ0j+592992M4vK2X2/kfAAAA+NFq1L99r+b/s/FhXVvNemnzuIcFAAAAvEf1X/4vVMVsVfswGub/AAAA8GPTqK+xa0TEfFwa17avhDrULwFcOQAAAAAnXz1/v1gV81XtUjS+3/wfAAAAOPn+Ul//P3fAPfb/NPig8c//RFHMNp4Pbv+y8ahTxXUenRo3cOrNFoer5xtnJo3UxdLpybtueqExufvlq5tg/ntS3J92r//GexhA/C0+Gsd8dG9c3tteM+5lfjXrpQvdvPdpKzqdMzPD9PbwD18/+GPUm//X/saZRtx/MNpa+O3vRvfqsTyvWnn+aHIaxK6zIQ4Yyzf1/Rbqay723OLZ+kKMSb/z436bO7d/Zvzxme/R54u4PI65PD8u51/f/rmqz9bCfls/GUXrHbf8RVwZx1y5emVc7DGK9rRRtHeO4q32xSFGsThtFIvvMopdgQBH5/6ULNTYnfjf4lh7NNn9RVwdx1w9Xx3E4/T5PY7ozWlH9OZhs1vEpPXXR/GPuDaOubYdvF+Orfr9+xtZ9dvqA9/W/SZ79Fv22o1qF5765tHv4+yTp88+fvDo7ldbX2193W4vLjU/aTZvtmO23oxJccD+AuD/1/Rn7EyNaHwyZVb9s1enFCz89+XLlzGKe3G9vtqgPuNgV6sfVDPxHachXJ8ya53f8YSX61NmdfM7HvRy+NjFI/ifAICjc/mAPHzY/H99yrz79Vx+0Ox4NnY+rQ0A+GGkxUxjfvjnRlFkgy9by8utznA9TYq8+3lSZCtraZL1h2nRXe/019JkUOTDvJv3qsoX2UpaJuXmYJAXw2Q1L5JBXma36ye/J5NHv5fpRqc/zLrloJd2yjTp5v1hpztMVrKymww2f9PLyvW0qD9cDtJutpp1O8Ms7ydlvll004UkKdN0R2C2kvaH2WpWVfvJoMg2OsWd5Iu8t7mRJitp2S2ywTAfN7jdV9ZfzYuNutmF497ZAHBCPHn67OHd0Wjr8Q9YOe5tBABeJ0sDAAAAAAAAAAAAAMDJdxTX/x2uMhsRJ2AYKioqD++OjvvIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC7/S8AAP//idZYIg==") open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 272.771525][T24563] RAX: ffffffffffffffda RBX: 00007f1812a08f80 RCX: 00007f18128e9169 [ 272.779543][T24563] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 0000000000000006 [ 272.787624][T24563] RBP: 00007f1812944ca1 R08: 0000000000000000 R09: 0000000000000000 [ 272.795585][T24563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 272.803555][T24563] R13: 00007ffe24849ebf R14: 00007f1811c5c300 R15: 0000000000022000 [ 272.811544][T24563] [ 272.814593][T24563] memory: usage 12504kB, limit 0kB, failcnt 38 15:41:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000280)=ANY=[], 0x11, 0x679, &(0x7f00000006c0)="$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") open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 272.820817][T24563] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 272.827661][T24563] Memory cgroup stats for /syz1: [ 272.828037][T24563] anon 49152 [ 272.828037][T24563] file 10448896 [ 272.828037][T24563] kernel 2289664 [ 272.828037][T24563] kernel_stack 0 [ 272.828037][T24563] pagetables 8192 [ 272.828037][T24563] sec_pagetables 0 [ 272.828037][T24563] percpu 73472 [ 272.828037][T24563] sock 0 [ 272.828037][T24563] vmalloc 0 [ 272.828037][T24563] shmem 10424320 [ 272.828037][T24563] file_mapped 98304 [ 272.828037][T24563] file_dirty 24576 [ 272.828037][T24563] file_writeback 0 [ 272.828037][T24563] swapcached 0 [ 272.828037][T24563] inactive_anon 49152 [ 272.828037][T24563] active_anon 10424320 [ 272.828037][T24563] inactive_file 8192 [ 272.828037][T24563] active_file 16384 [ 272.828037][T24563] unevictable 0 [ 272.828037][T24563] slab_reclaimable 44848 [ 272.828037][T24563] slab_unreclaimable 2148176 [ 272.828037][T24563] slab 2193024 [ 272.828037][T24563] workingset_refault_anon 0 [ 272.828037][T24563] workingset_refault_file 0 [ 272.828037][T24563] workingset_activate_anon 0 [ 272.828037][T24563] workingset_activate_file 0 [ 272.828037][T24563] workingset_restore_anon 0 [ 272.828037][T24563] workingset_restore_file 0 [ 272.828037][T24563] workingset_nodereclaim 0 [ 272.828037][T24563] pgscan 351 [ 272.828037][T24563] pgsteal 73 [ 272.828037][T24563] pgscan_kswapd 0 [ 272.828037][T24563] pgscan_direct 351 [ 272.828037][T24563] pgscan_khugepaged 0 [ 272.828037][T24563] pgsteal_kswapd 0 [ 272.828037][T24563] pgsteal_direct 73 [ 272.828037][T24563] pgsteal_khugepaged 0 [ 272.828037][T24563] pgfault 167919 [ 272.828037][T24563] pgmajfault 15 [ 272.828037][T24563] pgrefill 356 [ 272.828037][T24563] pgactivate 5791 [ 272.828037][T24563] pgdeactivate 365 [ 272.828037][T24563] pglazyfree 0 [ 272.828037][T24563] pglazyfreed 0 [ 272.992012][T24563] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=3134,uid=0 15:41:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) listen(r0, 0xfff) r1 = accept(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x84) 15:41:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x1, 0x0, 0x0, {0x7, 0x2}}, 0x20}}, 0x0) 15:41:26 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) close(0xffffffffffffffff) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000ac0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x12) 15:41:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001180)=@delchain={0x24, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 272.992082][T24563] Memory cgroup out of memory: Killed process 3134 (syz-executor.1) total-vm:42380kB, anon-rss:368kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 15:41:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x1, 0x0, 0x0, {0x7, 0x2}}, 0x20}}, 0x0) [ 273.053616][T24584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=24584 comm=syz-executor.0 [ 273.073437][T24584] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:41:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001180)=@delchain={0x24, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 273.102069][T24586] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 273.112067][T24586] CPU: 0 PID: 24586 Comm: syz-executor.4 Not tainted 6.3.0-rc7-syzkaller-00060-g789b4a41c247 #0 [ 273.113181][T24591] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=24591 comm=syz-executor.0 [ 273.122526][T24586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 [ 273.122540][T24586] Call Trace: [ 273.122545][T24586] 15:41:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x1, 0x0, 0x0, {0x7, 0x2}}, 0x20}}, 0x0) [ 273.122551][T24586] dump_stack_lvl+0xda/0x130 [ 273.143915][T24591] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 273.145606][T24586] dump_stack+0x15/0x20 [ 273.169827][T24586] dump_header+0x95/0x3c0 [ 273.174221][T24586] out_of_memory+0xa30/0xc30 [ 273.178814][T24586] mem_cgroup_out_of_memory+0x139/0x190 [ 273.184356][T24586] memory_max_write+0x1e3/0x270 [ 273.189372][T24586] ? memory_max_show+0x70/0x70 [ 273.194150][T24586] cgroup_file_write+0x16b/0x310 [ 273.199089][T24586] ? __check_object_size+0x329/0x4e0 [ 273.204447][T24586] ? cgroup_seqfile_stop+0x70/0x70 [ 273.209562][T24586] kernfs_fop_write_iter+0x1ca/0x2b0 [ 273.214879][T24586] vfs_write+0x463/0x760 [ 273.219188][T24586] ksys_write+0xeb/0x1a0 [ 273.223459][T24586] __x64_sys_write+0x42/0x50 [ 273.228080][T24586] do_syscall_64+0x41/0xc0 [ 273.232504][T24586] ? syscall_exit_to_user_mode+0x26/0x140 [ 273.238231][T24586] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 273.244305][T24586] RIP: 0033:0x7f18128e9169 [ 273.248815][T24586] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 273.268500][T24586] RSP: 002b:00007f1811c5c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 273.276901][T24586] RAX: ffffffffffffffda RBX: 00007f1812a08f80 RCX: 00007f18128e9169 [ 273.284968][T24586] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 0000000000000006 [ 273.292934][T24586] RBP: 00007f1812944ca1 R08: 0000000000000000 R09: 0000000000000000 [ 273.300899][T24586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 273.308904][T24586] R13: 00007ffe24849ebf R14: 00007f1811c5c300 R15: 0000000000022000 [ 273.316860][T24586] [ 273.319981][T24586] memory: usage 12416kB, limit 0kB, failcnt 55 [ 273.326177][T24586] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 273.333029][T24586] Memory cgroup stats for /syz1: [ 273.333360][T24586] anon 0 [ 273.333360][T24586] file 10448896 [ 273.333360][T24586] kernel 2265088 [ 273.333360][T24586] kernel_stack 0 [ 273.333360][T24586] pagetables 0 [ 273.333360][T24586] sec_pagetables 0 [ 273.333360][T24586] percpu 73472 [ 273.333360][T24586] sock 0 [ 273.333360][T24586] vmalloc 0 [ 273.333360][T24586] shmem 10424320 [ 273.333360][T24586] file_mapped 98304 [ 273.333360][T24586] file_dirty 24576 [ 273.333360][T24586] file_writeback 0 [ 273.333360][T24586] swapcached 0 [ 273.333360][T24586] inactive_anon 0 [ 273.333360][T24586] active_anon 10424320 [ 273.333360][T24586] inactive_file 8192 [ 273.333360][T24586] active_file 16384 [ 273.333360][T24586] unevictable 0 [ 273.333360][T24586] slab_reclaimable 35120 [ 273.333360][T24586] slab_unreclaimable 2144976 [ 273.333360][T24586] slab 2180096 [ 273.333360][T24586] workingset_refault_anon 0 [ 273.333360][T24586] workingset_refault_file 0 [ 273.333360][T24586] workingset_activate_anon 0 [ 273.333360][T24586] workingset_activate_file 0 [ 273.333360][T24586] workingset_restore_anon 0 [ 273.333360][T24586] workingset_restore_file 0 [ 273.333360][T24586] workingset_nodereclaim 0 [ 273.333360][T24586] pgscan 523 [ 273.333360][T24586] pgsteal 73 [ 273.333360][T24586] pgscan_kswapd 0 15:41:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x1, 0x0, 0x0, {0x7, 0x2}}, 0x20}}, 0x0) [ 273.333360][T24586] pgscan_direct 523 [ 273.333360][T24586] pgscan_khugepaged 0 [ 273.333360][T24586] pgsteal_kswapd 0 [ 273.333360][T24586] pgsteal_direct 73 [ 273.333360][T24586] pgsteal_khugepaged 0 [ 273.333360][T24586] pgfault 167919 [ 273.333360][T24586] pgmajfault 15 [ 273.333360][T24586] pgrefill 531 [ 273.333360][T24586] pgactivate 5966 [ 273.333360][T24586] pgdeactivate 540 [ 273.333360][T24586] pglazyfree 0 [ 273.333360][T24586] pglazyfreed 0 [ 273.496379][T24586] Out of memory and no killable processes... 15:41:26 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) close(0xffffffffffffffff) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000ac0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x12) [ 273.571586][ T3139] netdevsim netdevsim1 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 1024 - 0 [ 273.581893][ T3139] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:41:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) listen(r0, 0xfff) r1 = accept(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x84) 15:41:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001180)=@delchain={0x24, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}}, 0x24}}, 0x0) 15:41:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001180)=@delchain={0x24, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 273.632312][ T3139] netdevsim netdevsim1 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 1024 - 0 [ 273.642710][ T3139] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.691537][T24600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=24600 comm=syz-executor.0 [ 273.692041][T24601] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=24601 comm=syz-executor.2 [ 273.721917][ T3139] netdevsim netdevsim1 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 1024 - 0 [ 273.732486][ T3139] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.743706][T24600] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 273.762359][T24601] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 273.783275][ T3139] netdevsim netdevsim1 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 1024 - 0 [ 273.793737][ T3139] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:41:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) listen(r0, 0xfff) r1 = accept(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x84) 15:41:27 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) close(0xffffffffffffffff) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000ac0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x12) 15:41:27 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) close(0xffffffffffffffff) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000ac0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x12) 15:41:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001180)=@delchain={0x24, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}}, 0x24}}, 0x0) 15:41:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) [ 273.906286][T24615] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=24615 comm=syz-executor.2 [ 273.937686][T24612] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 15:41:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) [ 273.947726][T24612] CPU: 1 PID: 24612 Comm: syz-executor.4 Not tainted 6.3.0-rc7-syzkaller-00060-g789b4a41c247 #0 [ 273.958187][T24612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 [ 273.968244][T24612] Call Trace: [ 273.971586][T24612] [ 273.974592][T24612] dump_stack_lvl+0xda/0x130 [ 273.979195][T24612] dump_stack+0x15/0x20 [ 273.983380][T24612] dump_header+0x95/0x3c0 [ 273.987745][T24612] out_of_memory+0xa30/0xc30 [ 273.992353][T24612] mem_cgroup_out_of_memory+0x139/0x190 [ 273.997933][T24612] memory_max_write+0x1e3/0x270 15:41:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) 15:41:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) [ 274.002841][T24612] ? memory_max_show+0x70/0x70 [ 274.007649][T24612] cgroup_file_write+0x16b/0x310 [ 274.012650][T24612] ? __check_object_size+0x329/0x4e0 [ 274.017940][T24612] ? cgroup_seqfile_stop+0x70/0x70 [ 274.023060][T24612] kernfs_fop_write_iter+0x1ca/0x2b0 [ 274.028379][T24612] vfs_write+0x463/0x760 [ 274.032707][T24612] ksys_write+0xeb/0x1a0 [ 274.037070][T24612] __x64_sys_write+0x42/0x50 [ 274.041695][T24612] do_syscall_64+0x41/0xc0 [ 274.046207][T24612] ? syscall_exit_to_user_mode+0x26/0x140 [ 274.051949][T24612] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 274.058200][T24612] RIP: 0033:0x7f18128e9169 [ 274.062664][T24612] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 274.082358][T24612] RSP: 002b:00007f1811c5c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 274.090774][T24612] RAX: ffffffffffffffda RBX: 00007f1812a08f80 RCX: 00007f18128e9169 [ 274.098778][T24612] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 0000000000000006 [ 274.106735][T24612] RBP: 00007f1812944ca1 R08: 0000000000000000 R09: 0000000000000000 [ 274.114698][T24612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 274.122667][T24612] R13: 00007ffe24849ebf R14: 00007f1811c5c300 R15: 0000000000022000 [ 274.130632][T24612] [ 274.134621][T24612] memory: usage 12404kB, limit 0kB, failcnt 55 [ 274.140875][T24612] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 274.147702][T24612] Memory cgroup stats for /syz1: [ 274.148019][T24612] anon 0 [ 274.148019][T24612] file 10448896 [ 274.148019][T24612] kernel 2252800 [ 274.148019][T24612] kernel_stack 0 [ 274.148019][T24612] pagetables 0 [ 274.148019][T24612] sec_pagetables 0 [ 274.148019][T24612] percpu 73472 [ 274.148019][T24612] sock 0 [ 274.148019][T24612] vmalloc 0 [ 274.148019][T24612] shmem 10424320 [ 274.148019][T24612] file_mapped 98304 [ 274.148019][T24612] file_dirty 24576 [ 274.148019][T24612] file_writeback 0 [ 274.148019][T24612] swapcached 0 [ 274.148019][T24612] inactive_anon 0 [ 274.148019][T24612] active_anon 10424320 [ 274.148019][T24612] inactive_file 12288 [ 274.148019][T24612] active_file 12288 [ 274.148019][T24612] unevictable 0 [ 274.148019][T24612] slab_reclaimable 33944 [ 274.148019][T24612] slab_unreclaimable 2140640 [ 274.148019][T24612] slab 2174584 [ 274.148019][T24612] workingset_refault_anon 0 [ 274.148019][T24612] workingset_refault_file 0 [ 274.148019][T24612] workingset_activate_anon 0 [ 274.148019][T24612] workingset_activate_file 0 [ 274.148019][T24612] workingset_restore_anon 0 [ 274.148019][T24612] workingset_restore_file 0 [ 274.148019][T24612] workingset_nodereclaim 0 [ 274.148019][T24612] pgscan 607 [ 274.148019][T24612] pgsteal 73 [ 274.148019][T24612] pgscan_kswapd 0 [ 274.148019][T24612] pgscan_direct 607 [ 274.148019][T24612] pgscan_khugepaged 0 [ 274.148019][T24612] pgsteal_kswapd 0 [ 274.148019][T24612] pgsteal_direct 73 [ 274.148019][T24612] pgsteal_khugepaged 0 [ 274.148019][T24612] pgfault 167919 [ 274.148019][T24612] pgmajfault 15 [ 274.148019][T24612] pgrefill 616 [ 274.148019][T24612] pgactivate 6050 [ 274.148019][T24612] pgdeactivate 625 [ 274.148019][T24612] pglazyfree 0 15:41:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) [ 274.148019][T24612] pglazyfreed 0 [ 274.311449][T24612] Out of memory and no killable processes... [ 274.329989][T24615] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 15:41:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) listen(r0, 0xfff) r1 = accept(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x84) 15:41:27 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) close(0xffffffffffffffff) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000ac0)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x12) 15:41:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001180)=@delchain={0x24, 0x28, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 274.561971][T24657] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=24657 comm=syz-executor.2 [ 274.594563][T24658] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 274.604587][T24658] CPU: 0 PID: 24658 Comm: syz-executor.4 Not tainted 6.3.0-rc7-syzkaller-00060-g789b4a41c247 #0 [ 274.615014][T24658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 [ 274.625087][T24658] Call Trace: [ 274.628365][T24658] [ 274.631352][T24658] dump_stack_lvl+0xda/0x130 [ 274.636045][T24658] dump_stack+0x15/0x20 [ 274.640212][T24658] dump_header+0x95/0x3c0 [ 274.644562][T24658] out_of_memory+0xa30/0xc30 [ 274.649303][T24658] mem_cgroup_out_of_memory+0x139/0x190 [ 274.654893][T24658] memory_max_write+0x1e3/0x270 [ 274.659648][T24657] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 274.659785][T24658] ? memory_max_show+0x70/0x70 [ 274.673816][T24658] cgroup_file_write+0x16b/0x310 [ 274.678830][T24658] ? __check_object_size+0x329/0x4e0 [ 274.684240][T24658] ? cgroup_seqfile_stop+0x70/0x70 [ 274.689371][T24658] kernfs_fop_write_iter+0x1ca/0x2b0 [ 274.694713][T24658] vfs_write+0x463/0x760 [ 274.699025][T24658] ksys_write+0xeb/0x1a0 [ 274.703348][T24658] __x64_sys_write+0x42/0x50 [ 274.708049][T24658] do_syscall_64+0x41/0xc0 15:41:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) listen(r0, 0xfff) r1 = accept(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x84) 15:41:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) shutdown(r0, 0x1) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) [ 274.712476][T24658] ? syscall_exit_to_user_mode+0x26/0x140 [ 274.718298][T24658] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 274.724220][T24658] RIP: 0033:0x7f18128e9169 [ 274.728643][T24658] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 274.748323][T24658] RSP: 002b:00007f1811c5c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 274.756849][T24658] RAX: ffffffffffffffda RBX: 00007f1812a08f80 RCX: 00007f18128e9169 [ 274.764827][T24658] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 0000000000000006 [ 274.772813][T24658] RBP: 00007f1812944ca1 R08: 0000000000000000 R09: 0000000000000000 [ 274.780815][T24658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 274.788812][T24658] R13: 00007ffe24849ebf R14: 00007f1811c5c300 R15: 0000000000022000 [ 274.796781][T24658] [ 274.799834][T24658] memory: usage 12280kB, limit 0kB, failcnt 55 [ 274.806071][T24658] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 274.812951][T24658] Memory cgroup stats for /syz1: [ 274.813470][T24658] anon 0 [ 274.813470][T24658] file 10448896 [ 274.813470][T24658] kernel 2125824 [ 274.813470][T24658] kernel_stack 0 [ 274.813470][T24658] pagetables 0 [ 274.813470][T24658] sec_pagetables 0 [ 274.813470][T24658] percpu 69856 [ 274.813470][T24658] sock 0 [ 274.813470][T24658] vmalloc 0 [ 274.813470][T24658] shmem 10424320 [ 274.813470][T24658] file_mapped 98304 [ 274.813470][T24658] file_dirty 24576 [ 274.813470][T24658] file_writeback 0 [ 274.813470][T24658] swapcached 0 [ 274.813470][T24658] inactive_anon 0 [ 274.813470][T24658] active_anon 10424320 [ 274.813470][T24658] inactive_file 12288 [ 274.813470][T24658] active_file 12288 [ 274.813470][T24658] unevictable 0 [ 274.813470][T24658] slab_reclaimable 33944 [ 274.813470][T24658] slab_unreclaimable 2021288 [ 274.813470][T24658] slab 2055232 [ 274.813470][T24658] workingset_refault_anon 0 [ 274.813470][T24658] workingset_refault_file 0 [ 274.813470][T24658] workingset_activate_anon 0 [ 274.813470][T24658] workingset_activate_file 0 [ 274.813470][T24658] workingset_restore_anon 0 [ 274.813470][T24658] workingset_restore_file 0 [ 274.813470][T24658] workingset_nodereclaim 0 [ 274.813470][T24658] pgscan 690 [ 274.813470][T24658] pgsteal 73 [ 274.813470][T24658] pgscan_kswapd 0 [ 274.813470][T24658] pgscan_direct 690 [ 274.813470][T24658] pgscan_khugepaged 0 [ 274.813470][T24658] pgsteal_kswapd 0 [ 274.813470][T24658] pgsteal_direct 73 [ 274.813470][T24658] pgsteal_khugepaged 0 [ 274.813470][T24658] pgfault 167919 [ 274.813470][T24658] pgmajfault 15 [ 274.813470][T24658] pgrefill 700 [ 274.813470][T24658] pgactivate 6134 [ 274.813470][T24658] pgdeactivate 709 [ 274.813470][T24658] pglazyfree 0 [ 274.813470][T24658] pglazyfreed 0 [ 274.976362][T24658] Out of memory and no killable processes... [ 275.157363][ T3139] hsr_slave_0: left promiscuous mode [ 275.163686][ T3139] hsr_slave_1: left promiscuous mode [ 275.170448][ T3139] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 275.177957][ T3139] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 275.185959][ T3139] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 275.193406][ T3139] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 275.202077][ T3139] bridge_slave_1: left allmulticast mode [ 275.207818][ T3139] bridge_slave_1: left promiscuous mode [ 275.213518][ T3139] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.222030][ T3139] bridge_slave_0: left allmulticast mode [ 275.227738][ T3139] bridge_slave_0: left promiscuous mode [ 275.233471][ T3139] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.245149][ T3139] team0: left allmulticast mode [ 275.250034][ T3139] team_slave_0: left allmulticast mode [ 275.255532][ T3139] team_slave_1: left allmulticast mode [ 275.261036][ T3139] team0: left promiscuous mode [ 275.265783][ T3139] team_slave_0: left promiscuous mode [ 275.271320][ T3139] team_slave_1: left promiscuous mode [ 275.278324][ T3139] veth1_macvtap: left promiscuous mode [ 275.283962][ T3139] veth0_macvtap: left promiscuous mode [ 275.289558][ T3139] veth1_vlan: left promiscuous mode [ 275.294881][ T3139] veth0_vlan: left promiscuous mode [ 275.879356][ T3139] team0 (unregistering): Port device team_slave_1 removed [ 275.889041][ T3139] team0 (unregistering): Port device team_slave_0 removed [ 275.898712][ T3139] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 275.909989][ T3139] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 275.938303][ T3139] bond0 (unregistering): Released all slaves