5c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0xfe03004000000000, 0x0, 0x0) 14:45:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x3f00, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:45:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3900}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:45:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3901}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:45:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_setscheduler(r3, 0x2, &(0x7f00000000c0)=0x7fffffff) sched_setscheduler(r0, 0x2, &(0x7f0000002480)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@abs, 0x3e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r6, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f00000024c0), 0x1000, &(0x7f0000002b80)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}], [{@smackfsroot={'smackfsroot', 0x3d, '\\'}}, {@dont_measure}, {@fowner_gt={'fowner>', r1}}]}}) recvmmsg(r6, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) setsockopt$inet6_int(r6, 0x29, 0x8, &(0x7f0000000180)=0x9, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:45:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0xffffffff00000000, 0x0, 0x0) 14:45:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3902}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:45:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x6}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3903}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:45:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x2) 14:45:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x8102, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:45:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x7}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x6}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x6b4b, 0x0, 0x0) 14:45:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3a00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:45:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xb}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f00000024c0), 0x1000, &(0x7f0000002b80)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}], [{@smackfsroot={'smackfsroot', 0x3d, '\\'}}, {@dont_measure}, {@fowner_gt}]}}) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000180)=0x9, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x2, 0x0) 14:45:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x634e, 0x0, 0x0) 14:45:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3) 14:45:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x10}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3a01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:45:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3a02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:45:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x8500, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:45:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4) 14:45:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x634e, 0x0, 0x0) 14:45:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x11}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3a03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:45:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f00000024c0), 0x1000, &(0x7f0000002b80)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}], [{@smackfsroot={'smackfsroot', 0x3d, '\\'}}, {@dont_measure}, {@fowner_gt}]}}) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000180)=0x9, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x2, 0x0) 14:45:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x32}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3b00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1125.696566][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 1125.696578][ T26] audit: type=1804 audit(1669128359.584:1038): pid=17562 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/747/memory.events" dev="sda1" ino=1178 res=1 errno=0 14:45:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x6000, 0x0, 0x0) 14:45:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x5) 14:45:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3b01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1125.864744][ T26] audit: type=1800 audit(1669128359.624:1039): pid=17562 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1178 res=0 errno=0 [ 1125.988008][ T26] audit: type=1804 audit(1669128359.624:1040): pid=17562 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/747/memory.events" dev="sda1" ino=1178 res=1 errno=0 14:45:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0xd30b, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:45:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3b02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:45:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x3e}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:45:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x6) 14:45:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x281, 0x0, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:45:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x5fbb, 0x0, 0x0) 14:46:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x7) [ 1126.128053][ T26] audit: type=1804 audit(1669128360.014:1041): pid=17584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2894963752/syzkaller.N9ulYn/736/memory.events" dev="sda1" ino=1202 res=1 errno=0 14:46:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x120, 0x0, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x60}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3b03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1126.243087][ T26] audit: type=1800 audit(1669128360.014:1042): pid=17584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=1202 res=0 errno=0 14:46:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x8) 14:46:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xf0}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1126.389269][ T26] audit: type=1804 audit(1669128360.014:1043): pid=17584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir2894963752/syzkaller.N9ulYn/736/memory.events" dev="sda1" ino=1202 res=1 errno=0 14:46:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0xe70a, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xa) 14:46:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x300}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3c00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1126.536171][ T26] audit: type=1804 audit(1669128360.074:1044): pid=17588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/748/memory.events" dev="sda1" ino=1208 res=1 errno=0 14:46:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_setscheduler(r3, 0x2, &(0x7f00000000c0)=0x7fffffff) sched_setscheduler(r0, 0x2, &(0x7f0000002480)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@abs, 0x3e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r6, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f00000024c0), 0x1000, &(0x7f0000002b80)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}], [{@smackfsroot={'smackfsroot', 0x3d, '\\'}}, {@dont_measure}, {@fowner_gt={'fowner>', r1}}]}}) recvmmsg(r6, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) setsockopt$inet6_int(r6, 0x29, 0x8, &(0x7f0000000180)=0x9, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000240)={0xa, 0x4e1e, 0xffff, @local, 0x10000}, 0x1c) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r8}) 14:46:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3c01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x3e8}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1126.673558][ T26] audit: type=1800 audit(1669128360.074:1045): pid=17588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1208 res=0 errno=0 14:46:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x5fba, 0x0, 0x0, 0x0) 14:46:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe) 14:46:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3c02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x500}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1126.757098][ T26] audit: type=1804 audit(1669128360.074:1046): pid=17588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/748/memory.events" dev="sda1" ino=1208 res=1 errno=0 14:46:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3c03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1127.495653][ T26] audit: type=1804 audit(1669128360.174:1047): pid=17597 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2760549878/syzkaller.lQM7sm/633/memory.events" dev="sda1" ino=1213 res=1 errno=0 14:46:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0xff00, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x600}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x10) 14:46:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f74c", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3d00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f74c", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x700}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x60) 14:46:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_setscheduler(r3, 0x2, &(0x7f00000000c0)=0x7fffffff) sched_setscheduler(r0, 0x2, &(0x7f0000002480)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@abs, 0x3e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r6, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f00000024c0), 0x1000, &(0x7f0000002b80)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}], [{@smackfsroot={'smackfsroot', 0x3d, '\\'}}, {@dont_measure}, {@fowner_gt={'fowner>', r1}}]}}) recvmmsg(r6, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) setsockopt$inet6_int(r6, 0x29, 0x8, &(0x7f0000000180)=0x9, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000240)={0xa, 0x4e1e, 0xffff, @local, 0x10000}, 0x1c) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r8}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000002580)={&(0x7f0000002900)=ANY=[@ANYBLOB="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", @ANYRES64=r7, @ANYRES8=r5], 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 14:46:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3d01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xb00}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 1) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1127.824798][T17658] FAULT_INJECTION: forcing a failure. [ 1127.824798][T17658] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1127.853210][T17658] CPU: 0 PID: 17658 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller #0 [ 1127.861972][T17658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1127.872047][T17658] Call Trace: [ 1127.875436][T17658] [ 1127.878377][T17658] dump_stack_lvl+0xd1/0x138 [ 1127.882999][T17658] should_fail.cold+0x5/0xa [ 1127.887529][T17658] _copy_from_user+0x2e/0x170 [ 1127.892249][T17658] copy_msghdr_from_user+0x89/0x150 [ 1127.897476][T17658] ? __copy_msghdr+0x4b0/0x4b0 [ 1127.902254][T17658] ? find_held_lock+0x2d/0x110 [ 1127.907225][T17658] ___sys_recvmsg+0xbc/0x180 [ 1127.911831][T17658] ? copy_msghdr_from_user+0x150/0x150 [ 1127.917300][T17658] ? __fget_files+0x26a/0x440 [ 1127.922002][T17658] ? __fget_light+0xe5/0x270 [ 1127.926691][T17658] do_recvmmsg+0x25e/0x6e0 [ 1127.931109][T17658] ? ___sys_recvmsg+0x180/0x180 [ 1127.935968][T17658] ? find_held_lock+0x2d/0x110 [ 1127.940767][T17658] ? bpf_trace_run2+0x16f/0x3d0 [ 1127.945622][T17658] ? lock_downgrade+0x6e0/0x6e0 [ 1127.950478][T17658] ? ktime_get_mono_fast_ns+0x185/0x200 [ 1127.956029][T17658] ? bpf_trace_run2+0x196/0x3d0 [ 1127.960965][T17658] __x64_sys_recvmmsg+0x20f/0x260 [ 1127.966000][T17658] ? __do_sys_socketcall+0x650/0x650 [ 1127.971307][T17658] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1127.976865][T17658] do_syscall_64+0x39/0xb0 [ 1127.981288][T17658] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1127.987193][T17658] RIP: 0033:0x7fe79048c189 [ 1127.991601][T17658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1128.011232][T17658] RSP: 002b:00007fe79112e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 14:46:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3d02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe9) 14:46:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0xff01, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xb4c}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1128.019649][T17658] RAX: ffffffffffffffda RBX: 00007fe7905abf80 RCX: 00007fe79048c189 [ 1128.027704][T17658] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1128.035670][T17658] RBP: 00007fe79112e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1128.043669][T17658] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1128.051661][T17658] R13: 00007ffcd503afbf R14: 00007fe79112e300 R15: 0000000000022000 [ 1128.059643][T17658] 14:46:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 2) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3d03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xbb8}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3e00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1128.270688][T17678] FAULT_INJECTION: forcing a failure. [ 1128.270688][T17678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1128.336915][T17678] CPU: 1 PID: 17678 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller #0 [ 1128.345656][T17678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1128.355733][T17678] Call Trace: [ 1128.359023][T17678] [ 1128.361965][T17678] dump_stack_lvl+0xd1/0x138 [ 1128.366594][T17678] should_fail.cold+0x5/0xa [ 1128.371484][T17678] _copy_from_user+0x2e/0x170 [ 1128.376548][T17678] copy_msghdr_from_user+0x89/0x150 [ 1128.381792][T17678] ? __copy_msghdr+0x4b0/0x4b0 [ 1128.386570][T17678] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1128.392598][T17678] ___sys_recvmsg+0xbc/0x180 [ 1128.397211][T17678] ? copy_msghdr_from_user+0x150/0x150 [ 1128.402681][T17678] ? find_held_lock+0x2d/0x110 [ 1128.407732][T17678] ? __might_fault+0xd9/0x180 [ 1128.412502][T17678] ? lock_downgrade+0x6e0/0x6e0 [ 1128.417368][T17678] do_recvmmsg+0x25e/0x6e0 [ 1128.421781][T17678] ? ___sys_recvmsg+0x180/0x180 [ 1128.426633][T17678] ? find_held_lock+0x2d/0x110 [ 1128.431405][T17678] ? bpf_trace_run2+0x16f/0x3d0 [ 1128.436295][T17678] ? bpf_trace_run2+0x196/0x3d0 [ 1128.441322][T17678] __x64_sys_recvmmsg+0x20f/0x260 [ 1128.446349][T17678] ? __do_sys_socketcall+0x650/0x650 [ 1128.451632][T17678] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1128.457193][T17678] do_syscall_64+0x39/0xb0 [ 1128.461613][T17678] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1128.467504][T17678] RIP: 0033:0x7fe79048c189 [ 1128.472003][T17678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1128.491620][T17678] RSP: 002b:00007fe79112e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1128.500035][T17678] RAX: ffffffffffffffda RBX: 00007fe7905abf80 RCX: 00007fe79048c189 [ 1128.507998][T17678] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1128.515964][T17678] RBP: 00007fe79112e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1128.523927][T17678] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1128.531888][T17678] R13: 00007ffcd503afbf R14: 00007fe79112e300 R15: 0000000000022000 [ 1128.539872][T17678] 14:46:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x1f4) 14:46:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 3) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xd1b}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0xff0f, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xb4c}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3e01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xe80}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3e02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x300) [ 1128.763921][T17685] FAULT_INJECTION: forcing a failure. [ 1128.763921][T17685] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1128.792988][T17685] CPU: 1 PID: 17685 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller #0 [ 1128.801726][T17685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1128.811798][T17685] Call Trace: [ 1128.815089][T17685] [ 1128.818036][T17685] dump_stack_lvl+0xd1/0x138 [ 1128.822665][T17685] should_fail.cold+0x5/0xa [ 1128.827191][T17685] _copy_from_user+0x2e/0x170 [ 1128.831880][T17685] copy_msghdr_from_user+0x89/0x150 [ 1128.837079][T17685] ? __copy_msghdr+0x4b0/0x4b0 [ 1128.841842][T17685] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1128.847855][T17685] ___sys_recvmsg+0xbc/0x180 [ 1128.852439][T17685] ? copy_msghdr_from_user+0x150/0x150 [ 1128.857896][T17685] ? find_held_lock+0x2d/0x110 [ 1128.862672][T17685] ? __might_fault+0xd9/0x180 [ 1128.867360][T17685] ? lock_downgrade+0x6e0/0x6e0 [ 1128.872233][T17685] do_recvmmsg+0x25e/0x6e0 [ 1128.876828][T17685] ? ___sys_recvmsg+0x180/0x180 [ 1128.881701][T17685] ? find_held_lock+0x2d/0x110 [ 1128.886470][T17685] ? bpf_trace_run2+0x16f/0x3d0 [ 1128.891335][T17685] ? bpf_trace_run2+0x196/0x3d0 [ 1128.896275][T17685] __x64_sys_recvmmsg+0x20f/0x260 [ 1128.901297][T17685] ? __do_sys_socketcall+0x650/0x650 [ 1128.906594][T17685] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1128.912170][T17685] do_syscall_64+0x39/0xb0 [ 1128.916594][T17685] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1128.922488][T17685] RIP: 0033:0x7fe79048c189 [ 1128.926895][T17685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1128.946508][T17685] RSP: 002b:00007fe79112e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1128.954921][T17685] RAX: ffffffffffffffda RBX: 00007fe7905abf80 RCX: 00007fe79048c189 14:46:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) [ 1128.962893][T17685] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1128.970866][T17685] RBP: 00007fe79112e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1128.978830][T17685] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1128.986801][T17685] R13: 00007ffcd503afbf R14: 00007fe79112e300 R15: 0000000000022000 [ 1128.994811][T17685] 14:46:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x1100}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3e03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1129.061097][T17704] FAULT_INJECTION: forcing a failure. [ 1129.061097][T17704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1129.093110][T17704] CPU: 0 PID: 17704 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1129.101847][T17704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1129.111931][T17704] Call Trace: [ 1129.115218][T17704] [ 1129.118142][T17704] dump_stack_lvl+0xd1/0x138 [ 1129.122736][T17704] should_fail.cold+0x5/0xa [ 1129.127238][T17704] _copy_from_user+0x2e/0x170 [ 1129.131920][T17704] copy_msghdr_from_user+0x89/0x150 [ 1129.137115][T17704] ? __copy_msghdr+0x4b0/0x4b0 [ 1129.141878][T17704] ? find_held_lock+0x2d/0x110 [ 1129.146650][T17704] ___sys_recvmsg+0xbc/0x180 [ 1129.151236][T17704] ? copy_msghdr_from_user+0x150/0x150 [ 1129.156698][T17704] ? __fget_files+0x26a/0x440 [ 1129.161384][T17704] ? __fget_light+0xe5/0x270 [ 1129.165985][T17704] do_recvmmsg+0x25e/0x6e0 [ 1129.170413][T17704] ? ___sys_recvmsg+0x180/0x180 [ 1129.175259][T17704] ? find_held_lock+0x2d/0x110 [ 1129.180030][T17704] ? bpf_trace_run2+0x16f/0x3d0 [ 1129.184876][T17704] ? lock_downgrade+0x6e0/0x6e0 [ 1129.189729][T17704] ? ktime_get_mono_fast_ns+0x185/0x200 [ 1129.195280][T17704] ? bpf_trace_run2+0x196/0x3d0 [ 1129.200125][T17704] __x64_sys_recvmmsg+0x20f/0x260 [ 1129.205146][T17704] ? __do_sys_socketcall+0x650/0x650 [ 1129.210430][T17704] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1129.215983][T17704] do_syscall_64+0x39/0xb0 [ 1129.220404][T17704] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1129.226296][T17704] RIP: 0033:0x7f594e28c189 [ 1129.230703][T17704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1129.250483][T17704] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 14:46:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0xff1f, 0x0, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x309) [ 1129.258895][T17704] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1129.266859][T17704] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1129.274997][T17704] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1129.283135][T17704] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1129.291099][T17704] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1129.299087][T17704] 14:46:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3f00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x1b0d}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3f01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x33b) [ 1129.456797][T17718] FAULT_INJECTION: forcing a failure. [ 1129.456797][T17718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1129.495370][T17718] CPU: 0 PID: 17718 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller #0 [ 1129.504182][T17718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1129.514246][T17718] Call Trace: [ 1129.517535][T17718] [ 1129.520474][T17718] dump_stack_lvl+0xd1/0x138 [ 1129.525100][T17718] should_fail.cold+0x5/0xa [ 1129.529642][T17718] _copy_from_user+0x2e/0x170 [ 1129.534407][T17718] copy_msghdr_from_user+0x89/0x150 [ 1129.539677][T17718] ? __copy_msghdr+0x4b0/0x4b0 [ 1129.544471][T17718] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1129.550507][T17718] ___sys_recvmsg+0xbc/0x180 [ 1129.555125][T17718] ? copy_msghdr_from_user+0x150/0x150 [ 1129.560612][T17718] ? find_held_lock+0x2d/0x110 [ 1129.565417][T17718] ? __might_fault+0xd9/0x180 [ 1129.570131][T17718] ? lock_downgrade+0x6e0/0x6e0 [ 1129.575034][T17718] do_recvmmsg+0x25e/0x6e0 [ 1129.579485][T17718] ? ___sys_recvmsg+0x180/0x180 [ 1129.584356][T17718] ? find_held_lock+0x2d/0x110 [ 1129.589124][T17718] ? bpf_trace_run2+0x16f/0x3d0 [ 1129.594000][T17718] ? bpf_trace_run2+0x196/0x3d0 [ 1129.598856][T17718] __x64_sys_recvmmsg+0x20f/0x260 [ 1129.603887][T17718] ? __do_sys_socketcall+0x650/0x650 [ 1129.609221][T17718] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1129.614797][T17718] do_syscall_64+0x39/0xb0 [ 1129.619230][T17718] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1129.625126][T17718] RIP: 0033:0x7fe79048c189 [ 1129.629558][T17718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1129.649209][T17718] RSP: 002b:00007fe79112e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 14:46:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3f02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x1f00}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1129.657656][T17718] RAX: ffffffffffffffda RBX: 00007fe7905abf80 RCX: 00007fe79048c189 [ 1129.666004][T17718] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1129.674135][T17718] RBP: 00007fe79112e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1129.682161][T17718] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1129.690154][T17718] R13: 00007ffcd503afbf R14: 00007fe79112e300 R15: 0000000000022000 [ 1129.698168][T17718] 14:46:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 2) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x2, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3f03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x34f) 14:46:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x3200}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 5) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x3e00}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4000}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3e8) 14:46:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x3, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x4000}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x500) [ 1129.992972][T17743] FAULT_INJECTION: forcing a failure. [ 1129.992972][T17743] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1130.044489][T17743] CPU: 1 PID: 17743 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1130.053228][T17743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1130.063308][T17743] Call Trace: [ 1130.066593][T17743] [ 1130.069524][T17743] dump_stack_lvl+0xd1/0x138 [ 1130.074145][T17743] should_fail.cold+0x5/0xa [ 1130.078677][T17743] _copy_from_user+0x2e/0x170 [ 1130.083386][T17743] copy_msghdr_from_user+0x89/0x150 [ 1130.088613][T17743] ? __copy_msghdr+0x4b0/0x4b0 [ 1130.093402][T17743] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1130.099425][T17743] ___sys_recvmsg+0xbc/0x180 [ 1130.104045][T17743] ? copy_msghdr_from_user+0x150/0x150 [ 1130.109531][T17743] ? find_held_lock+0x2d/0x110 [ 1130.114414][T17743] ? __might_fault+0xd9/0x180 [ 1130.119130][T17743] ? lock_downgrade+0x6e0/0x6e0 [ 1130.124037][T17743] do_recvmmsg+0x25e/0x6e0 [ 1130.128483][T17743] ? ___sys_recvmsg+0x180/0x180 [ 1130.133361][T17743] ? find_held_lock+0x2d/0x110 [ 1130.138167][T17743] ? bpf_trace_run2+0x16f/0x3d0 [ 1130.143058][T17743] ? bpf_trace_run2+0x196/0x3d0 [ 1130.147939][T17743] __x64_sys_recvmmsg+0x20f/0x260 [ 1130.152991][T17743] ? __do_sys_socketcall+0x650/0x650 [ 1130.158335][T17743] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1130.163933][T17743] do_syscall_64+0x39/0xb0 [ 1130.168383][T17743] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1130.174305][T17743] RIP: 0033:0x7f594e28c189 [ 1130.178743][T17743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1130.198372][T17743] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1130.206802][T17743] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1130.214786][T17743] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1130.222770][T17743] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1130.230753][T17743] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1130.238735][T17743] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1130.246741][T17743] [ 1130.268989][T17753] FAULT_INJECTION: forcing a failure. [ 1130.268989][T17753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1130.294011][T17753] CPU: 0 PID: 17753 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller #0 [ 1130.302743][T17753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1130.312820][T17753] Call Trace: [ 1130.316116][T17753] [ 1130.319061][T17753] dump_stack_lvl+0xd1/0x138 [ 1130.323682][T17753] should_fail.cold+0x5/0xa [ 1130.328205][T17753] _copy_from_user+0x2e/0x170 [ 1130.332923][T17753] copy_msghdr_from_user+0x89/0x150 [ 1130.338148][T17753] ? __copy_msghdr+0x4b0/0x4b0 [ 1130.342944][T17753] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1130.348970][T17753] ___sys_recvmsg+0xbc/0x180 [ 1130.353580][T17753] ? copy_msghdr_from_user+0x150/0x150 [ 1130.359059][T17753] ? find_held_lock+0x2d/0x110 [ 1130.364162][T17753] ? __might_fault+0xd9/0x180 [ 1130.368869][T17753] ? lock_downgrade+0x6e0/0x6e0 [ 1130.373856][T17753] do_recvmmsg+0x25e/0x6e0 [ 1130.378293][T17753] ? ___sys_recvmsg+0x180/0x180 [ 1130.383152][T17753] ? find_held_lock+0x2d/0x110 [ 1130.387930][T17753] ? bpf_trace_run2+0x16f/0x3d0 [ 1130.392905][T17753] ? bpf_trace_run2+0x196/0x3d0 [ 1130.397784][T17753] __x64_sys_recvmmsg+0x20f/0x260 [ 1130.402842][T17753] ? __do_sys_socketcall+0x650/0x650 [ 1130.408150][T17753] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1130.413733][T17753] do_syscall_64+0x39/0xb0 [ 1130.418178][T17753] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1130.424102][T17753] RIP: 0033:0x7fe79048c189 [ 1130.428533][T17753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1130.448165][T17753] RSP: 002b:00007fe79112e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1130.456617][T17753] RAX: ffffffffffffffda RBX: 00007fe7905abf80 RCX: 00007fe79048c189 14:46:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 3) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4001}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x4c0b}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x4, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x5c8) [ 1130.464603][T17753] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1130.472585][T17753] RBP: 00007fe79112e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1130.480573][T17753] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1130.488559][T17753] R13: 00007ffcd503afbf R14: 00007fe79112e300 R15: 0000000000022000 [ 1130.496564][T17753] [ 1130.551571][T17768] FAULT_INJECTION: forcing a failure. [ 1130.551571][T17768] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1130.612679][T17768] CPU: 0 PID: 17768 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1130.621428][T17768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1130.631482][T17768] Call Trace: [ 1130.634758][T17768] [ 1130.637684][T17768] dump_stack_lvl+0xd1/0x138 [ 1130.642279][T17768] should_fail.cold+0x5/0xa [ 1130.646956][T17768] _copy_from_user+0x2e/0x170 [ 1130.651643][T17768] copy_msghdr_from_user+0x89/0x150 [ 1130.656839][T17768] ? __copy_msghdr+0x4b0/0x4b0 [ 1130.661602][T17768] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1130.667597][T17768] ___sys_recvmsg+0xbc/0x180 [ 1130.672182][T17768] ? copy_msghdr_from_user+0x150/0x150 [ 1130.677638][T17768] ? find_held_lock+0x2d/0x110 [ 1130.682406][T17768] ? __might_fault+0xd9/0x180 [ 1130.687087][T17768] ? lock_downgrade+0x6e0/0x6e0 [ 1130.691960][T17768] do_recvmmsg+0x25e/0x6e0 [ 1130.696376][T17768] ? ___sys_recvmsg+0x180/0x180 [ 1130.701223][T17768] ? find_held_lock+0x2d/0x110 [ 1130.705994][T17768] ? bpf_trace_run2+0x16f/0x3d0 [ 1130.710853][T17768] ? bpf_trace_run2+0x196/0x3d0 [ 1130.715703][T17768] __x64_sys_recvmmsg+0x20f/0x260 [ 1130.720723][T17768] ? __do_sys_socketcall+0x650/0x650 [ 1130.726014][T17768] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1130.731566][T17768] do_syscall_64+0x39/0xb0 [ 1130.735987][T17768] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1130.741879][T17768] RIP: 0033:0x7f594e28c189 [ 1130.746286][T17768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1130.765886][T17768] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1130.774291][T17768] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1130.782253][T17768] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1130.790219][T17768] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1130.798182][T17768] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 14:46:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 6) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4002}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x6000}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x5dc) [ 1130.806145][T17768] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1130.814124][T17768] 14:46:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x5, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4003}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x600) [ 1130.944448][ T26] kauditd_printk_skb: 26 callbacks suppressed [ 1130.944464][ T26] audit: type=1804 audit(1669128364.834:1074): pid=17786 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/757/memory.events" dev="sda1" ino=1194 res=1 errno=0 [ 1130.983182][T17784] FAULT_INJECTION: forcing a failure. [ 1130.983182][T17784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1131.042981][T17784] CPU: 1 PID: 17784 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller #0 [ 1131.051716][T17784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1131.061781][T17784] Call Trace: [ 1131.065060][T17784] [ 1131.067983][T17784] dump_stack_lvl+0xd1/0x138 [ 1131.072586][T17784] should_fail.cold+0x5/0xa [ 1131.077088][T17784] _copy_from_user+0x2e/0x170 [ 1131.081774][T17784] copy_msghdr_from_user+0x89/0x150 [ 1131.086974][T17784] ? __copy_msghdr+0x4b0/0x4b0 [ 1131.091749][T17784] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1131.097749][T17784] ___sys_recvmsg+0xbc/0x180 [ 1131.102340][T17784] ? copy_msghdr_from_user+0x150/0x150 [ 1131.107799][T17784] ? find_held_lock+0x2d/0x110 [ 1131.112574][T17784] ? __might_fault+0xd9/0x180 [ 1131.117268][T17784] ? lock_downgrade+0x6e0/0x6e0 [ 1131.122144][T17784] do_recvmmsg+0x25e/0x6e0 [ 1131.126563][T17784] ? ___sys_recvmsg+0x180/0x180 [ 1131.131411][T17784] ? find_held_lock+0x2d/0x110 [ 1131.136210][T17784] ? bpf_trace_run2+0x16f/0x3d0 [ 1131.141068][T17784] ? bpf_trace_run2+0x196/0x3d0 [ 1131.145916][T17784] __x64_sys_recvmmsg+0x20f/0x260 [ 1131.150941][T17784] ? __do_sys_socketcall+0x650/0x650 [ 1131.156230][T17784] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1131.161787][T17784] do_syscall_64+0x39/0xb0 [ 1131.166211][T17784] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1131.172105][T17784] RIP: 0033:0x7fe79048c189 [ 1131.176514][T17784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1131.196127][T17784] RSP: 002b:00007fe79112e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1131.204538][T17784] RAX: ffffffffffffffda RBX: 00007fe7905abf80 RCX: 00007fe79048c189 [ 1131.212501][T17784] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1131.220563][T17784] RBP: 00007fe79112e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1131.228532][T17784] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1131.236500][T17784] R13: 00007ffcd503afbf R14: 00007fe79112e300 R15: 0000000000022000 [ 1131.244479][T17784] [ 1131.259286][ T26] audit: type=1800 audit(1669128364.834:1075): pid=17786 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1194 res=0 errno=0 14:46:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x717e}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x700) 14:46:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4100}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x6, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 7) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1131.327924][ T26] audit: type=1804 audit(1669128364.834:1076): pid=17786 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/757/memory.events" dev="sda1" ino=1194 res=1 errno=0 14:46:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4101}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x903) 14:46:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x7e71}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1131.513209][ T26] audit: type=1804 audit(1669128365.354:1077): pid=17805 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/758/memory.events" dev="sda1" ino=1193 res=1 errno=0 [ 1131.544934][T17810] FAULT_INJECTION: forcing a failure. [ 1131.544934][T17810] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1131.592543][ T26] audit: type=1800 audit(1669128365.354:1078): pid=17805 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1193 res=0 errno=0 [ 1131.596306][T17810] CPU: 0 PID: 17810 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1131.623088][T17810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1131.633155][T17810] Call Trace: 14:46:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4102}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1131.634174][ T26] audit: type=1804 audit(1669128365.354:1079): pid=17805 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/758/memory.events" dev="sda1" ino=1193 res=1 errno=0 [ 1131.636426][T17810] [ 1131.636437][T17810] dump_stack_lvl+0xd1/0x138 [ 1131.636476][T17810] should_fail.cold+0x5/0xa [ 1131.674004][T17810] _copy_from_user+0x2e/0x170 [ 1131.678717][T17810] copy_msghdr_from_user+0x89/0x150 [ 1131.683934][T17810] ? __copy_msghdr+0x4b0/0x4b0 [ 1131.688716][T17810] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1131.694717][T17810] ___sys_recvmsg+0xbc/0x180 [ 1131.699304][T17810] ? copy_msghdr_from_user+0x150/0x150 [ 1131.704759][T17810] ? find_held_lock+0x2d/0x110 [ 1131.709526][T17810] ? __might_fault+0xd9/0x180 [ 1131.714235][T17810] ? lock_downgrade+0x6e0/0x6e0 [ 1131.719103][T17810] do_recvmmsg+0x25e/0x6e0 [ 1131.723521][T17810] ? ___sys_recvmsg+0x180/0x180 [ 1131.728403][T17810] ? find_held_lock+0x2d/0x110 [ 1131.733169][T17810] ? bpf_trace_run2+0x16f/0x3d0 [ 1131.738034][T17810] ? bpf_trace_run2+0x196/0x3d0 [ 1131.742884][T17810] __x64_sys_recvmmsg+0x20f/0x260 [ 1131.747906][T17810] ? __do_sys_socketcall+0x650/0x650 [ 1131.753189][T17810] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1131.758737][T17810] do_syscall_64+0x39/0xb0 [ 1131.763159][T17810] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1131.769223][T17810] RIP: 0033:0x7f594e28c189 [ 1131.773632][T17810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1131.793328][T17810] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1131.801738][T17810] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1131.809702][T17810] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1131.817667][T17810] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1131.825631][T17810] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1131.833595][T17810] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 14:46:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0x800e}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1131.841573][T17810] 14:46:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 5) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xa00) 14:46:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xb80b}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4103}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x7, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000002, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4200}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xb3d) 14:46:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xe1fd}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000003, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1132.153441][ T26] audit: type=1804 audit(1669128366.044:1080): pid=17837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/759/memory.events" dev="sda1" ino=1177 res=1 errno=0 14:46:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4201}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1132.267177][T17841] FAULT_INJECTION: forcing a failure. [ 1132.267177][T17841] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1132.310392][ T26] audit: type=1800 audit(1669128366.044:1081): pid=17837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1177 res=0 errno=0 [ 1132.347447][T17841] CPU: 1 PID: 17841 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1132.356183][T17841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1132.366245][T17841] Call Trace: [ 1132.369516][T17841] [ 1132.372438][T17841] dump_stack_lvl+0xd1/0x138 [ 1132.377040][T17841] should_fail.cold+0x5/0xa [ 1132.381544][T17841] _copy_from_user+0x2e/0x170 [ 1132.386228][T17841] copy_msghdr_from_user+0x89/0x150 [ 1132.391430][T17841] ? __copy_msghdr+0x4b0/0x4b0 [ 1132.396196][T17841] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1132.402188][T17841] ___sys_recvmsg+0xbc/0x180 [ 1132.406775][T17841] ? copy_msghdr_from_user+0x150/0x150 [ 1132.412228][T17841] ? find_held_lock+0x2d/0x110 [ 1132.417000][T17841] ? __might_fault+0xd9/0x180 [ 1132.421687][T17841] ? lock_downgrade+0x6e0/0x6e0 [ 1132.426552][T17841] do_recvmmsg+0x25e/0x6e0 [ 1132.430968][T17841] ? ___sys_recvmsg+0x180/0x180 [ 1132.435819][T17841] ? find_held_lock+0x2d/0x110 [ 1132.440613][T17841] ? bpf_trace_run2+0x16f/0x3d0 [ 1132.445493][T17841] ? bpf_trace_run2+0x196/0x3d0 [ 1132.450341][T17841] __x64_sys_recvmmsg+0x20f/0x260 [ 1132.455388][T17841] ? __do_sys_socketcall+0x650/0x650 [ 1132.460677][T17841] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1132.466230][T17841] do_syscall_64+0x39/0xb0 [ 1132.470649][T17841] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1132.476543][T17841] RIP: 0033:0x7f594e28c189 [ 1132.480950][T17841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1132.500554][T17841] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 14:46:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xe803}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1132.508985][T17841] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1132.516954][T17841] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1132.524923][T17841] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1132.532884][T17841] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1132.540858][T17841] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1132.548852][T17841] [ 1132.666317][ T26] audit: type=1804 audit(1669128366.044:1082): pid=17837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/759/memory.events" dev="sda1" ino=1177 res=1 errno=0 14:46:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 6) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xbb8) 14:46:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000004, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4202}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xf000}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x8, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xfde1}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4203}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1132.788346][ T26] audit: type=1804 audit(1669128366.674:1083): pid=17865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/760/memory.events" dev="sda1" ino=1198 res=1 errno=0 14:46:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe00) 14:46:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4300}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000005, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1132.855189][T17867] FAULT_INJECTION: forcing a failure. [ 1132.855189][T17867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1132.921860][T17867] CPU: 0 PID: 17867 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1132.930683][T17867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1132.940757][T17867] Call Trace: [ 1132.944044][T17867] [ 1132.946987][T17867] dump_stack_lvl+0xd1/0x138 [ 1132.951688][T17867] should_fail.cold+0x5/0xa [ 1132.956223][T17867] _copy_from_user+0x2e/0x170 [ 1132.960932][T17867] copy_msghdr_from_user+0x89/0x150 [ 1132.966164][T17867] ? __copy_msghdr+0x4b0/0x4b0 [ 1132.971040][T17867] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1132.977060][T17867] ___sys_recvmsg+0xbc/0x180 [ 1132.981670][T17867] ? copy_msghdr_from_user+0x150/0x150 [ 1132.987156][T17867] ? find_held_lock+0x2d/0x110 [ 1132.991958][T17867] ? __might_fault+0xd9/0x180 [ 1132.996666][T17867] ? lock_downgrade+0x6e0/0x6e0 [ 1133.001579][T17867] do_recvmmsg+0x25e/0x6e0 [ 1133.006025][T17867] ? ___sys_recvmsg+0x180/0x180 [ 1133.010900][T17867] ? find_held_lock+0x2d/0x110 [ 1133.015701][T17867] ? bpf_trace_run2+0x16f/0x3d0 14:46:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xa, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) [ 1133.020595][T17867] ? bpf_trace_run2+0x196/0x3d0 [ 1133.025465][T17867] __x64_sys_recvmmsg+0x20f/0x260 [ 1133.030511][T17867] ? __do_sys_socketcall+0x650/0x650 [ 1133.035826][T17867] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1133.041409][T17867] do_syscall_64+0x39/0xb0 [ 1133.045867][T17867] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1133.051795][T17867] RIP: 0033:0x7f594e28c189 [ 1133.056228][T17867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1133.075872][T17867] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1133.084316][T17867] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1133.092744][T17867] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1133.100738][T17867] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.108726][T17867] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1133.116709][T17867] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1133.124708][T17867] 14:46:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000006, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xecb) 14:46:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4301}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558, 0x0, 0xffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xc, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4302}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x1371) 14:46:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000007, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4303}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1133.416861][T17904] FAULT_INJECTION: forcing a failure. [ 1133.416861][T17904] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1133.453406][T17904] CPU: 1 PID: 17904 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1133.462135][T17904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1133.472214][T17904] Call Trace: [ 1133.475501][T17904] [ 1133.478447][T17904] dump_stack_lvl+0xd1/0x138 [ 1133.483067][T17904] should_fail.cold+0x5/0xa [ 1133.487600][T17904] _copy_from_user+0x2e/0x170 [ 1133.492310][T17904] copy_msghdr_from_user+0x89/0x150 [ 1133.497548][T17904] ? __copy_msghdr+0x4b0/0x4b0 [ 1133.502355][T17904] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1133.508392][T17904] ___sys_recvmsg+0xbc/0x180 [ 1133.513001][T17904] ? copy_msghdr_from_user+0x150/0x150 [ 1133.518493][T17904] ? find_held_lock+0x2d/0x110 [ 1133.523303][T17904] ? __might_fault+0xd9/0x180 [ 1133.528019][T17904] ? lock_downgrade+0x6e0/0x6e0 [ 1133.532911][T17904] do_recvmmsg+0x25e/0x6e0 [ 1133.537352][T17904] ? ___sys_recvmsg+0x180/0x180 [ 1133.542310][T17904] ? find_held_lock+0x2d/0x110 [ 1133.547107][T17904] ? bpf_trace_run2+0x16f/0x3d0 [ 1133.552035][T17904] ? bpf_trace_run2+0x196/0x3d0 [ 1133.556906][T17904] __x64_sys_recvmmsg+0x20f/0x260 [ 1133.562049][T17904] ? __do_sys_socketcall+0x650/0x650 [ 1133.567365][T17904] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1133.572946][T17904] do_syscall_64+0x39/0xb0 [ 1133.577399][T17904] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1133.583319][T17904] RIP: 0033:0x7f594e28c189 [ 1133.587744][T17904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1133.607384][T17904] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1133.615820][T17904] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1133.623815][T17904] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1133.632241][T17904] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.640225][T17904] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1133.648218][T17904] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1133.656236][T17904] 14:46:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x1493) 14:46:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4400}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000008, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xd, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4401}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x1a5b) 14:46:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000009, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1133.892659][T17935] FAULT_INJECTION: forcing a failure. [ 1133.892659][T17935] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:46:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4402}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1133.933666][T17935] CPU: 0 PID: 17935 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1133.942487][T17935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1133.952585][T17935] Call Trace: [ 1133.955875][T17935] [ 1133.958816][T17935] dump_stack_lvl+0xd1/0x138 [ 1133.963700][T17935] should_fail.cold+0x5/0xa [ 1133.968231][T17935] _copy_from_user+0x2e/0x170 [ 1133.973023][T17935] copy_msghdr_from_user+0x89/0x150 [ 1133.978240][T17935] ? __copy_msghdr+0x4b0/0x4b0 14:46:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4403}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1133.983029][T17935] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1133.989056][T17935] ___sys_recvmsg+0xbc/0x180 [ 1133.993673][T17935] ? copy_msghdr_from_user+0x150/0x150 [ 1133.999150][T17935] ? find_held_lock+0x2d/0x110 [ 1134.003948][T17935] ? __might_fault+0xd9/0x180 [ 1134.008653][T17935] ? lock_downgrade+0x6e0/0x6e0 [ 1134.013567][T17935] do_recvmmsg+0x25e/0x6e0 [ 1134.018010][T17935] ? ___sys_recvmsg+0x180/0x180 [ 1134.022885][T17935] ? find_held_lock+0x2d/0x110 [ 1134.027694][T17935] ? bpf_trace_run2+0x16f/0x3d0 [ 1134.032579][T17935] ? bpf_trace_run2+0x196/0x3d0 [ 1134.037450][T17935] __x64_sys_recvmmsg+0x20f/0x260 [ 1134.042513][T17935] ? __do_sys_socketcall+0x650/0x650 [ 1134.047834][T17935] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1134.053438][T17935] do_syscall_64+0x39/0xb0 [ 1134.057889][T17935] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1134.063810][T17935] RIP: 0033:0x7f594e28c189 [ 1134.068229][T17935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1134.087977][T17935] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1134.096389][T17935] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1134.104459][T17935] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1134.112443][T17935] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1134.120428][T17935] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1134.128393][T17935] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1134.136365][T17935] 14:46:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4500}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x10, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x2023) 14:46:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4501}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x2320) 14:46:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4502}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1134.425942][T17965] FAULT_INJECTION: forcing a failure. [ 1134.425942][T17965] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:46:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1134.485397][T17965] CPU: 0 PID: 17965 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1134.494131][T17965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1134.504207][T17965] Call Trace: [ 1134.507505][T17965] [ 1134.510449][T17965] dump_stack_lvl+0xd1/0x138 [ 1134.515076][T17965] should_fail.cold+0x5/0xa [ 1134.519619][T17965] _copy_from_user+0x2e/0x170 [ 1134.524337][T17965] copy_msghdr_from_user+0x89/0x150 [ 1134.529648][T17965] ? __copy_msghdr+0x4b0/0x4b0 [ 1134.534441][T17965] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1134.540472][T17965] ___sys_recvmsg+0xbc/0x180 [ 1134.545079][T17965] ? copy_msghdr_from_user+0x150/0x150 [ 1134.550742][T17965] ? find_held_lock+0x2d/0x110 [ 1134.555548][T17965] ? __might_fault+0xd9/0x180 [ 1134.560266][T17965] ? lock_downgrade+0x6e0/0x6e0 [ 1134.565178][T17965] do_recvmmsg+0x25e/0x6e0 [ 1134.569683][T17965] ? ___sys_recvmsg+0x180/0x180 [ 1134.574536][T17965] ? find_held_lock+0x2d/0x110 [ 1134.579396][T17965] ? bpf_trace_run2+0x16f/0x3d0 [ 1134.584269][T17965] ? bpf_trace_run2+0x196/0x3d0 [ 1134.589134][T17965] __x64_sys_recvmmsg+0x20f/0x260 [ 1134.594183][T17965] ? __do_sys_socketcall+0x650/0x650 [ 1134.599493][T17965] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1134.605057][T17965] do_syscall_64+0x39/0xb0 [ 1134.609481][T17965] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1134.615409][T17965] RIP: 0033:0x7f594e28c189 [ 1134.619815][T17965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1134.639423][T17965] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1134.647836][T17965] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1134.655804][T17965] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1134.663769][T17965] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1134.671903][T17965] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1134.679866][T17965] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1134.687840][T17965] 14:46:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x25eb) 14:46:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4503}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x12, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4600}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x2b54) 14:46:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4601}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1135.025910][T17999] FAULT_INJECTION: forcing a failure. [ 1135.025910][T17999] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1135.043768][T17999] CPU: 1 PID: 17999 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1135.052490][T17999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1135.062560][T17999] Call Trace: [ 1135.065853][T17999] [ 1135.068800][T17999] dump_stack_lvl+0xd1/0x138 [ 1135.073421][T17999] should_fail.cold+0x5/0xa [ 1135.077945][T17999] _copy_from_user+0x2e/0x170 [ 1135.082652][T17999] copy_msghdr_from_user+0x89/0x150 [ 1135.087869][T17999] ? __copy_msghdr+0x4b0/0x4b0 [ 1135.092667][T17999] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1135.098690][T17999] ___sys_recvmsg+0xbc/0x180 [ 1135.103315][T17999] ? copy_msghdr_from_user+0x150/0x150 [ 1135.108817][T17999] ? find_held_lock+0x2d/0x110 [ 1135.113619][T17999] ? __might_fault+0xd9/0x180 [ 1135.118340][T17999] ? lock_downgrade+0x6e0/0x6e0 [ 1135.123445][T17999] do_recvmmsg+0x25e/0x6e0 [ 1135.127866][T17999] ? ___sys_recvmsg+0x180/0x180 [ 1135.132713][T17999] ? find_held_lock+0x2d/0x110 [ 1135.137483][T17999] ? bpf_trace_run2+0x16f/0x3d0 [ 1135.142344][T17999] ? bpf_trace_run2+0x196/0x3d0 [ 1135.147195][T17999] __x64_sys_recvmmsg+0x20f/0x260 [ 1135.152244][T17999] ? __do_sys_socketcall+0x650/0x650 [ 1135.157550][T17999] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1135.163106][T17999] do_syscall_64+0x39/0xb0 [ 1135.167550][T17999] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1135.173442][T17999] RIP: 0033:0x7f594e28c189 [ 1135.177848][T17999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1135.197816][T17999] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1135.206235][T17999] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1135.214201][T17999] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 14:46:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1135.222165][T17999] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1135.230135][T17999] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1135.238098][T17999] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1135.246079][T17999] 14:46:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 11) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x85, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x2bb3) 14:46:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4602}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000f, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4603}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x7}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x317b) 14:46:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000010, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0xb}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4700}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1135.590087][T18031] FAULT_INJECTION: forcing a failure. [ 1135.590087][T18031] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1135.687180][T18031] CPU: 0 PID: 18031 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1135.695931][T18031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1135.706018][T18031] Call Trace: [ 1135.709317][T18031] [ 1135.712269][T18031] dump_stack_lvl+0xd1/0x138 [ 1135.716888][T18031] should_fail.cold+0x5/0xa [ 1135.721412][T18031] _copy_from_user+0x2e/0x170 [ 1135.726123][T18031] copy_msghdr_from_user+0x89/0x150 [ 1135.731357][T18031] ? __copy_msghdr+0x4b0/0x4b0 [ 1135.736151][T18031] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1135.742179][T18031] ___sys_recvmsg+0xbc/0x180 [ 1135.746789][T18031] ? copy_msghdr_from_user+0x150/0x150 [ 1135.752249][T18031] ? find_held_lock+0x2d/0x110 [ 1135.757027][T18031] ? __might_fault+0xd9/0x180 [ 1135.761709][T18031] ? lock_downgrade+0x6e0/0x6e0 [ 1135.766577][T18031] do_recvmmsg+0x25e/0x6e0 [ 1135.770996][T18031] ? ___sys_recvmsg+0x180/0x180 [ 1135.775855][T18031] ? find_held_lock+0x2d/0x110 [ 1135.780623][T18031] ? bpf_trace_run2+0x16f/0x3d0 [ 1135.785507][T18031] ? bpf_trace_run2+0x196/0x3d0 [ 1135.790358][T18031] __x64_sys_recvmmsg+0x20f/0x260 [ 1135.795380][T18031] ? __do_sys_socketcall+0x650/0x650 [ 1135.800867][T18031] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1135.806420][T18031] do_syscall_64+0x39/0xb0 [ 1135.810841][T18031] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1135.816759][T18031] RIP: 0033:0x7f594e28c189 [ 1135.821167][T18031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1135.840773][T18031] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1135.849266][T18031] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1135.857228][T18031] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1135.865194][T18031] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1135.873158][T18031] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1135.881151][T18031] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1135.889303][T18031] 14:46:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 12) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3743) 14:46:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x120, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x10}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000011, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4701}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3b03) [ 1136.077790][T18055] FAULT_INJECTION: forcing a failure. [ 1136.077790][T18055] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1136.108086][T18055] CPU: 1 PID: 18055 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1136.116988][T18055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1136.127235][T18055] Call Trace: [ 1136.130532][T18055] [ 1136.133473][T18055] dump_stack_lvl+0xd1/0x138 [ 1136.138185][T18055] should_fail.cold+0x5/0xa [ 1136.142712][T18055] _copy_from_user+0x2e/0x170 [ 1136.147423][T18055] copy_msghdr_from_user+0x89/0x150 [ 1136.152649][T18055] ? __copy_msghdr+0x4b0/0x4b0 [ 1136.157436][T18055] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1136.163627][T18055] ___sys_recvmsg+0xbc/0x180 [ 1136.168236][T18055] ? copy_msghdr_from_user+0x150/0x150 [ 1136.173713][T18055] ? find_held_lock+0x2d/0x110 14:46:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x11}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4702}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1136.178511][T18055] ? __might_fault+0xd9/0x180 [ 1136.183228][T18055] ? lock_downgrade+0x6e0/0x6e0 [ 1136.188285][T18055] do_recvmmsg+0x25e/0x6e0 [ 1136.192739][T18055] ? ___sys_recvmsg+0x180/0x180 [ 1136.197614][T18055] ? find_held_lock+0x2d/0x110 [ 1136.202410][T18055] ? bpf_trace_run2+0x16f/0x3d0 [ 1136.207290][T18055] ? bpf_trace_run2+0x196/0x3d0 [ 1136.212163][T18055] __x64_sys_recvmmsg+0x20f/0x260 [ 1136.217223][T18055] ? __do_sys_socketcall+0x650/0x650 [ 1136.222713][T18055] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1136.228304][T18055] do_syscall_64+0x39/0xb0 [ 1136.232755][T18055] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1136.238770][T18055] RIP: 0033:0x7f594e28c189 [ 1136.243197][T18055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1136.262822][T18055] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 14:46:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000012, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1136.271263][T18055] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1136.279260][T18055] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1136.287451][T18055] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1136.295436][T18055] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1136.303520][T18055] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1136.311616][T18055] 14:46:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4703}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 13) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3d0b) 14:46:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x32}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x281, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) [ 1136.377226][ T26] kauditd_printk_skb: 20 callbacks suppressed [ 1136.377242][ T26] audit: type=1804 audit(1669128370.264:1104): pid=18068 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/767/memory.events" dev="sda1" ino=1176 res=1 errno=0 14:46:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4800}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000013, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3f00) 14:46:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x3e}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4801}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1136.557882][T18086] FAULT_INJECTION: forcing a failure. [ 1136.557882][T18086] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:46:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4000) 14:46:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x60}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1136.589096][ T26] audit: type=1800 audit(1669128370.264:1105): pid=18068 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1176 res=0 errno=0 [ 1136.625219][T18086] CPU: 0 PID: 18086 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1136.633986][T18086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1136.644054][T18086] Call Trace: [ 1136.647347][T18086] [ 1136.650289][T18086] dump_stack_lvl+0xd1/0x138 14:46:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4802}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1136.654942][T18086] should_fail.cold+0x5/0xa [ 1136.659468][T18086] _copy_to_user+0x2e/0x150 [ 1136.664005][T18086] move_addr_to_user+0x182/0x1e0 [ 1136.668980][T18086] ____sys_recvmsg+0x335/0x610 [ 1136.673779][T18086] ? kernel_recvmsg+0x160/0x160 [ 1136.678688][T18086] ? __copy_msghdr+0x4b0/0x4b0 [ 1136.683476][T18086] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1136.689508][T18086] ___sys_recvmsg+0xf2/0x180 [ 1136.694128][T18086] ? copy_msghdr_from_user+0x150/0x150 [ 1136.699859][T18086] ? find_held_lock+0x2d/0x110 [ 1136.704648][T18086] ? __might_fault+0xd9/0x180 [ 1136.709443][T18086] ? lock_downgrade+0x6e0/0x6e0 [ 1136.714333][T18086] do_recvmmsg+0x25e/0x6e0 [ 1136.718771][T18086] ? ___sys_recvmsg+0x180/0x180 [ 1136.723641][T18086] ? find_held_lock+0x2d/0x110 [ 1136.728619][T18086] ? bpf_trace_run2+0x16f/0x3d0 [ 1136.733522][T18086] ? bpf_trace_run2+0x196/0x3d0 [ 1136.738403][T18086] __x64_sys_recvmmsg+0x20f/0x260 [ 1136.743458][T18086] ? __do_sys_socketcall+0x650/0x650 [ 1136.748782][T18086] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1136.754548][T18086] do_syscall_64+0x39/0xb0 [ 1136.758998][T18086] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1136.764916][T18086] RIP: 0033:0x7f594e28c189 [ 1136.769380][T18086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1136.789193][T18086] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1136.797627][T18086] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1136.805635][T18086] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1136.813631][T18086] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1136.821626][T18086] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1136.829706][T18086] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1136.837723][T18086] [ 1136.865786][ T26] audit: type=1804 audit(1669128370.474:1106): pid=18098 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/768/memory.events" dev="sda1" ino=1208 res=1 errno=0 [ 1136.909667][ T26] audit: type=1800 audit(1669128370.474:1107): pid=18098 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1208 res=0 errno=0 14:46:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 14) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x300, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000014, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4803}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x100}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x42d3) [ 1136.951942][ T26] audit: type=1804 audit(1669128370.474:1108): pid=18098 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/768/memory.events" dev="sda1" ino=1208 res=1 errno=0 14:46:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4900}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4337) 14:46:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1137.048552][ T26] audit: type=1804 audit(1669128370.934:1109): pid=18122 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/769/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000015, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4901}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1137.151436][ T26] audit: type=1800 audit(1669128370.934:1110): pid=18122 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1207 res=0 errno=0 14:46:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1137.249527][ T26] audit: type=1804 audit(1669128370.964:1111): pid=18122 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/769/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 15) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x489b) 14:46:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4902}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000016, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x500, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000017, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4903}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1137.463770][ T26] audit: type=1804 audit(1669128371.354:1112): pid=18153 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/770/memory.events" dev="sda1" ino=1212 res=1 errno=0 14:46:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4b6b) 14:46:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4a00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1137.596616][ T26] audit: type=1800 audit(1669128371.354:1113): pid=18153 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1212 res=0 errno=0 14:46:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 16) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4e63) 14:46:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x600, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4a01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000018, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4a02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4f03) 14:46:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000019, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4a03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 17) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x542b) 14:46:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4b00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x700, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4b01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x59f3) 14:46:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4b02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1138.411501][T18219] FAULT_INJECTION: forcing a failure. [ 1138.411501][T18219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1138.501912][T18219] CPU: 0 PID: 18219 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1138.510634][T18219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1138.520815][T18219] Call Trace: [ 1138.524103][T18219] [ 1138.527045][T18219] dump_stack_lvl+0xd1/0x138 [ 1138.531672][T18219] should_fail.cold+0x5/0xa [ 1138.536228][T18219] _copy_from_user+0x2e/0x170 [ 1138.540947][T18219] copy_msghdr_from_user+0x89/0x150 [ 1138.546164][T18219] ? __copy_msghdr+0x4b0/0x4b0 [ 1138.550952][T18219] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1138.556976][T18219] ___sys_recvmsg+0xbc/0x180 [ 1138.561597][T18219] ? copy_msghdr_from_user+0x150/0x150 [ 1138.567057][T18219] ? find_held_lock+0x2d/0x110 [ 1138.571826][T18219] ? __might_fault+0xd9/0x180 [ 1138.576505][T18219] ? lock_downgrade+0x6e0/0x6e0 [ 1138.581371][T18219] do_recvmmsg+0x25e/0x6e0 [ 1138.585786][T18219] ? ___sys_recvmsg+0x180/0x180 [ 1138.590634][T18219] ? find_held_lock+0x2d/0x110 [ 1138.595397][T18219] ? bpf_trace_run2+0x16f/0x3d0 [ 1138.600254][T18219] ? bpf_trace_run2+0x196/0x3d0 [ 1138.605103][T18219] __x64_sys_recvmmsg+0x20f/0x260 [ 1138.610127][T18219] ? __do_sys_socketcall+0x650/0x650 [ 1138.615412][T18219] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1138.620964][T18219] do_syscall_64+0x39/0xb0 [ 1138.625381][T18219] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1138.631273][T18219] RIP: 0033:0x7f594e28c189 [ 1138.635684][T18219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1138.655382][T18219] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1138.663792][T18219] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1138.671929][T18219] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1138.679892][T18219] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1138.687854][T18219] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1138.695817][T18219] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1138.703794][T18219] 14:46:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 18) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x5b1a) 14:46:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xa00, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4b03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4c00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x5fbb) 14:46:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4c01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1138.980896][T18250] FAULT_INJECTION: forcing a failure. [ 1138.980896][T18250] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1139.032989][T18250] CPU: 1 PID: 18250 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1139.041803][T18250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1139.051854][T18250] Call Trace: [ 1139.055127][T18250] [ 1139.058055][T18250] dump_stack_lvl+0xd1/0x138 [ 1139.062653][T18250] should_fail.cold+0x5/0xa [ 1139.067158][T18250] _copy_from_user+0x2e/0x170 [ 1139.071847][T18250] copy_msghdr_from_user+0x89/0x150 [ 1139.077048][T18250] ? __copy_msghdr+0x4b0/0x4b0 [ 1139.081812][T18250] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1139.087979][T18250] ___sys_recvmsg+0xbc/0x180 [ 1139.092675][T18250] ? copy_msghdr_from_user+0x150/0x150 [ 1139.098137][T18250] ? find_held_lock+0x2d/0x110 [ 1139.102910][T18250] ? __might_fault+0xd9/0x180 [ 1139.107591][T18250] ? lock_downgrade+0x6e0/0x6e0 [ 1139.112460][T18250] do_recvmmsg+0x25e/0x6e0 [ 1139.116878][T18250] ? ___sys_recvmsg+0x180/0x180 [ 1139.121728][T18250] ? find_held_lock+0x2d/0x110 [ 1139.126502][T18250] ? bpf_trace_run2+0x16f/0x3d0 [ 1139.131363][T18250] ? bpf_trace_run2+0x196/0x3d0 [ 1139.136213][T18250] __x64_sys_recvmmsg+0x20f/0x260 [ 1139.141238][T18250] ? __do_sys_socketcall+0x650/0x650 [ 1139.146522][T18250] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1139.152078][T18250] do_syscall_64+0x39/0xb0 [ 1139.156500][T18250] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1139.162393][T18250] RIP: 0033:0x7f594e28c189 [ 1139.166803][T18250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1139.186410][T18250] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1139.194902][T18250] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1139.203213][T18250] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1139.211188][T18250] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1139.219158][T18250] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 14:46:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1139.227212][T18250] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1139.235194][T18250] 14:46:13 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 19) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x6000) 14:46:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000021, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4c02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xae7, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x634e) 14:46:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4c03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80b}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000022, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4d00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x6583) [ 1139.695915][T18281] FAULT_INJECTION: forcing a failure. [ 1139.695915][T18281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1139.760218][T18281] CPU: 0 PID: 18281 Comm: syz-executor.1 Not tainted 6.1.0-rc6-syzkaller #0 [ 1139.769206][T18281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1139.779272][T18281] Call Trace: [ 1139.782569][T18281] [ 1139.785508][T18281] dump_stack_lvl+0xd1/0x138 [ 1139.790137][T18281] should_fail.cold+0x5/0xa [ 1139.794662][T18281] _copy_from_user+0x2e/0x170 [ 1139.799373][T18281] copy_msghdr_from_user+0x89/0x150 [ 1139.804586][T18281] ? __copy_msghdr+0x4b0/0x4b0 [ 1139.809401][T18281] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1139.815421][T18281] ___sys_recvmsg+0xbc/0x180 [ 1139.820031][T18281] ? copy_msghdr_from_user+0x150/0x150 [ 1139.825506][T18281] ? find_held_lock+0x2d/0x110 [ 1139.830308][T18281] ? __might_fault+0xd9/0x180 [ 1139.835016][T18281] ? lock_downgrade+0x6e0/0x6e0 [ 1139.839908][T18281] do_recvmmsg+0x25e/0x6e0 [ 1139.844342][T18281] ? ___sys_recvmsg+0x180/0x180 [ 1139.849228][T18281] ? find_held_lock+0x2d/0x110 [ 1139.854056][T18281] ? bpf_trace_run2+0x16f/0x3d0 [ 1139.858943][T18281] ? bpf_trace_run2+0x196/0x3d0 [ 1139.863814][T18281] __x64_sys_recvmmsg+0x20f/0x260 [ 1139.868854][T18281] ? __do_sys_socketcall+0x650/0x650 [ 1139.874163][T18281] ? rcu_read_lock_sched_held+0x3e/0x70 [ 1139.879741][T18281] do_syscall_64+0x39/0xb0 [ 1139.884187][T18281] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1139.890110][T18281] RIP: 0033:0x7f594e28c189 [ 1139.894549][T18281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1139.914273][T18281] RSP: 002b:00007f594ef2e168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1139.922719][T18281] RAX: ffffffffffffffda RBX: 00007f594e3abf80 RCX: 00007f594e28c189 [ 1139.930873][T18281] RDX: 0400000000000284 RSI: 0000000020000040 RDI: 0000000000000003 [ 1139.938865][T18281] RBP: 00007f594ef2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1139.946824][T18281] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1139.954804][T18281] R13: 00007fff730c800f R14: 00007f594ef2e300 R15: 0000000000022000 [ 1139.963035][T18281] 14:46:13 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) (fail_nth: 20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4d01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xbd3, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x6b4b) 14:46:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000023, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x811}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4d02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x7113) 14:46:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000024, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x832}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4d03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:14 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x76db) 14:46:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000025, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83e}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4e00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xc00, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x7b31) 14:46:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x860}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4e01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000026, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4e02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:14 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000002, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x8365) 14:46:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000027, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xd00, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4e03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4f00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x9314) 14:46:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000028, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4f01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x9b48) 14:46:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000003, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000029, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xb32b) 14:46:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4f02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x1200, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4f03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xb80b) 14:46:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5000}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000004, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xbb5f) 14:46:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5001}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x1f00, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5002}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1141.655939][ T26] kauditd_printk_skb: 25 callbacks suppressed [ 1141.655985][ T26] audit: type=1804 audit(1669128375.544:1139): pid=18433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/779/memory.events" dev="sda1" ino=1211 res=1 errno=0 14:46:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5003}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xc805) [ 1141.756370][ T26] audit: type=1800 audit(1669128375.544:1140): pid=18433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1211 res=0 errno=0 [ 1141.779899][ T26] audit: type=1804 audit(1669128375.614:1141): pid=18433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/779/memory.events" dev="sda1" ino=1211 res=1 errno=0 14:46:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000005, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5100}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xcb0e) 14:46:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x1fff, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5101}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xd342) 14:46:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x892f}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1142.161618][ T26] audit: type=1804 audit(1669128376.044:1142): pid=18467 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/780/memory.events" dev="sda1" ino=1183 res=1 errno=0 14:46:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5102}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002f, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1142.268663][ T26] audit: type=1800 audit(1669128376.074:1143): pid=18467 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1183 res=0 errno=0 [ 1142.385041][ T26] audit: type=1804 audit(1669128376.074:1144): pid=18467 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/780/memory.events" dev="sda1" ino=1183 res=1 errno=0 14:46:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000006, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xdb76) 14:46:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5103}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x2000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000030, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5200}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xdc05) [ 1142.564327][ T26] audit: type=1804 audit(1669128376.454:1145): pid=18498 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/781/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000031, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5201}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1142.648994][ T26] audit: type=1800 audit(1669128376.454:1146): pid=18498 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1207 res=0 errno=0 14:46:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe803) [ 1142.745768][ T26] audit: type=1804 audit(1669128376.484:1147): pid=18498 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/781/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000007, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5202}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000032, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe900) 14:46:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x2001, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5203}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}, 0x0) 14:46:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xeb25) 14:46:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000033, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1143.019606][ T26] audit: type=1804 audit(1669128376.904:1148): pid=18528 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/782/memory.events" dev="sda1" ino=1176 res=1 errno=0 14:46:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}, 0x0) 14:46:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5300}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:17 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000008, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xf359) 14:46:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000034, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x10}}}}}}}, 0x0) 14:46:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5301}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x3f00, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5302}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xf401) 14:46:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000035, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5303}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:46:17 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000009, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x34000) 14:46:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5400}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000036, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x3}}}}}}}, 0x0) 14:46:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x8102, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5401}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x400300) 14:46:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x4}}}}}}}, 0x0) 14:46:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000037, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5402}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x5}}}}}}}, 0x0) 14:46:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000a, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x1000000) 14:46:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5403}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000038, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x6}}}}}}}, 0x0) 14:46:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x8500, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5500}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x2000000) 14:46:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) 14:46:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000039, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5501}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x4}}}}}}}, 0x0) 14:46:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000b, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3000000) 14:46:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5502}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x5}}}}}}}, 0x0) 14:46:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xd30b, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5503}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x10}}}}}}}, 0x0) 14:46:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3090000) 14:46:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5600}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4000000) 14:46:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000c, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x543}}}}}}}, 0x0) 14:46:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5601}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x5000000) 14:46:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xe70a, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5602}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x608}}}}}}}, 0x0) 14:46:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x6000000) 14:46:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5603}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x689}}}}}}}, 0x0) 14:46:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000d, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x7000000) 14:46:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5700}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x2f89}}}}}}}, 0x0) 14:46:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xff00, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5701}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x3580}}}}}}}, 0x0) 14:46:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x8000000) 14:46:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5702}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000041, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x4788}}}}}}}, 0x0) 14:46:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5703}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xa000000) 14:46:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000042, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x4888}}}}}}}, 0x0) 14:46:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000e, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xff01, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x6488}}}}}}}, 0x0) 14:46:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5800}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xb3d0000) 14:46:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000043, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5801}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe000000) 14:46:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5802}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000044, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x2}}}}}}}, 0x0) 14:46:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000000f, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5803}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xff0f, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x10000000) 14:46:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3}}}}}}}, 0x0) 14:46:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000045, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5900}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4}}}}}}}, 0x0) 14:46:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x13710000) 14:46:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000046, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x5}}}}}}}, 0x0) 14:46:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5901}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000010, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x20000169) 14:46:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5902}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000047, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x6}}}}}}}, 0x0) 14:46:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xff1f, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5903}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x7}}}}}}}, 0x0) 14:46:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x20000179) 14:46:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000048, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5a00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x23200000) 14:46:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000011, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xb}}}}}}}, 0x0) 14:46:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5a01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000049, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x22000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x2b540000) 14:46:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5a02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000004a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x10}}}}}}}, 0x0) [ 1147.026994][ T26] kauditd_printk_skb: 29 callbacks suppressed [ 1147.027008][ T26] audit: type=1804 audit(1669128380.914:1178): pid=18845 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/792/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3b030000) 14:46:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5a03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1147.163082][ T26] audit: type=1800 audit(1669128380.964:1179): pid=18845 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1207 res=0 errno=0 14:46:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x11}}}}}}}, 0x0) [ 1147.256554][ T26] audit: type=1804 audit(1669128380.964:1180): pid=18845 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/792/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000012, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3f000000) 14:46:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000004b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5b00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x32}}}}}}}, 0x0) 14:46:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x40000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x40000000) 14:46:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5b01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000004c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1147.484431][ T26] audit: type=1804 audit(1669128381.374:1181): pid=18878 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/793/memory.events" dev="sda1" ino=1175 res=1 errno=0 14:46:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3e}}}}}}}, 0x0) 14:46:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5b02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x400003f9) [ 1147.589087][ T26] audit: type=1800 audit(1669128381.374:1182): pid=18878 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1175 res=0 errno=0 [ 1147.706957][ T26] audit: type=1804 audit(1669128381.374:1183): pid=18878 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/793/memory.events" dev="sda1" ino=1175 res=1 errno=0 14:46:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000013, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x60}}}}}}}, 0x0) 14:46:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000004d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x400003fe) 14:46:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5b03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x100000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5c00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xf0}}}}}}}, 0x0) 14:46:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x43370000) [ 1147.914990][ T26] audit: type=1804 audit(1669128381.804:1184): pid=18909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/794/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000004e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5c01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x300}}}}}}}, 0x0) [ 1148.014765][ T26] audit: type=1800 audit(1669128381.834:1185): pid=18909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1207 res=0 errno=0 [ 1148.114337][ T26] audit: type=1804 audit(1669128381.834:1186): pid=18909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/794/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000014, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5c02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4b6b0000) 14:46:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000004f, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3e8}}}}}}}, 0x0) 14:46:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x200000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5c03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x500}}}}}}}, 0x0) 14:46:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4f030000) [ 1148.316985][ T26] audit: type=1804 audit(1669128382.204:1187): pid=18939 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/795/memory.events" dev="sda1" ino=1201 res=1 errno=0 14:46:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000050, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5d00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x600}}}}}}}, 0x0) 14:46:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000015, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x5b1a0000) 14:46:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000051, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5d01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x200200, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x700}}}}}}}, 0x0) 14:46:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xb00}}}}}}}, 0x0) 14:46:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5d02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x60000000) 14:46:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000052, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5d03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xb4c}}}}}}}, 0x0) 14:46:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000016, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x60a441fd) 14:46:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000053, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5e00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xbb8}}}}}}}, 0x0) 14:46:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x800000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xd1b}}}}}}}, 0x0) 14:46:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5e01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x634e0000) 14:46:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000054, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xe80}}}}}}}, 0x0) 14:46:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5e02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5e03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x69010020) 14:46:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000055, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x1100}}}}}}}, 0x0) 14:46:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000017, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x1000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x1b0d}}}}}}}, 0x0) 14:46:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5f00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x79010020) 14:46:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000056, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x1f00}}}}}}}, 0x0) 14:46:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5f01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x7b310000) 14:46:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000057, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3200}}}}}}}, 0x0) 14:46:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5f02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000018, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x83650000) 14:46:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x1000002, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3e00}}}}}}}, 0x0) 14:46:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5f03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000058, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x93140000) 14:46:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6000}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4000}}}}}}}, 0x0) 14:46:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000059, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4c0b}}}}}}}, 0x0) 14:46:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6001}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000019, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x9b480000) 14:46:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000005a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x6000}}}}}}}, 0x0) 14:46:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6002}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x1200000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6003}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x717e}}}}}}}, 0x0) 14:46:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xb32b0000) 14:46:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000005b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6100}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xb80b0000) 14:46:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001a, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x7e71}}}}}}}, 0x0) 14:46:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6101}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xbb5f0000) 14:46:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000005c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x1ffffff, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x800e}}}}}}}, 0x0) 14:46:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6102}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xc8050000) 14:46:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000005d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6103}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xb80b}}}}}}}, 0x0) 14:46:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001b, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xcb0e0000) 14:46:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000005e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x2000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6200}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xe1fd}}}}}}}, 0x0) 14:46:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6201}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xd3420000) 14:46:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6202}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xe803}}}}}}}, 0x0) 14:46:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000005f, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xdb760000) 14:46:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6203}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xf000}}}}}}}, 0x0) 14:46:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000060, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001c, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x2000001, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xdc050000) 14:46:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6300}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe8030000) 14:46:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xfde1}}}}}}}, 0x0) 14:46:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000061, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe9000000) 14:46:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xf0ffff}}}}}}}, 0x0) 14:46:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6301}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000062, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xeb250000) 14:46:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001d, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x1000000}}}}}}}, 0x0) 14:46:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6302}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x3000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xf3590000) 14:46:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000063, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x2000000}}}}}}}, 0x0) 14:46:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6303}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xf4010000) 14:46:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000064, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6400}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3000000}}}}}}}, 0x0) 14:46:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000001e, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xf9030040) 14:46:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6401}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x4000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4000000}}}}}}}, 0x0) 14:46:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000065, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6402}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x5000000}}}}}}}, 0x0) 14:46:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xfd41a460) [ 1152.275591][ T26] kauditd_printk_skb: 29 callbacks suppressed [ 1152.275606][ T26] audit: type=1804 audit(1669128386.164:1217): pid=19261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/805/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000066, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x5000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6403}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1152.420052][ T26] audit: type=1800 audit(1669128386.164:1218): pid=19261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1207 res=0 errno=0 [ 1152.511711][ T26] audit: type=1804 audit(1669128386.164:1219): pid=19261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/805/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000021, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x6000000}}}}}}}, 0x0) 14:46:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xfe030040) 14:46:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000067, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6500}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x7000000}}}}}}}, 0x0) [ 1152.622949][ T26] audit: type=1804 audit(1669128386.394:1220): pid=19283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/806/memory.events" dev="sda1" ino=1188 res=1 errno=0 14:46:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6501}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x40030000000000) 14:46:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000068, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6502}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1152.758056][ T26] audit: type=1800 audit(1669128386.394:1221): pid=19283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1188 res=0 errno=0 14:46:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x6000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xb000000}}}}}}}, 0x0) [ 1152.832596][ T26] audit: type=1804 audit(1669128386.394:1222): pid=19283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/806/memory.events" dev="sda1" ino=1188 res=1 errno=0 [ 1152.972479][ T26] audit: type=1804 audit(1669128386.794:1223): pid=19316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/807/memory.events" dev="sda1" ino=1197 res=1 errno=0 [ 1153.009591][ T26] audit: type=1800 audit(1669128386.794:1224): pid=19316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1197 res=0 errno=0 14:46:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000022, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x100000000000000) 14:46:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6503}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000069, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x10000000}}}}}}}, 0x0) 14:46:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x7000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) [ 1153.052959][ T26] audit: type=1804 audit(1669128386.794:1225): pid=19316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/807/memory.events" dev="sda1" ino=1197 res=1 errno=0 14:46:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6600}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x11000000}}}}}}}, 0x0) 14:46:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x200000000000000) [ 1153.160944][ T26] audit: type=1804 audit(1669128387.044:1226): pid=19330 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/808/memory.events" dev="sda1" ino=1177 res=1 errno=0 14:46:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000006a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6601}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x1b0d0000}}}}}}}, 0x0) 14:46:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000023, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x300000000000000) 14:46:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x8000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6602}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000006b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x1f000000}}}}}}}, 0x0) 14:46:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6603}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x309000000000000) 14:46:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x32000000}}}}}}}, 0x0) 14:46:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000006c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6700}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x400000000000000) 14:46:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000024, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3e000000}}}}}}}, 0x0) 14:46:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000006d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6701}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x500000000000000) 14:46:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xa000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6702}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x40000000}}}}}}}, 0x0) 14:46:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x600000000000000) 14:46:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000006e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6703}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4c0b0000}}}}}}}, 0x0) 14:46:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x700000000000000) 14:46:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xc000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000006f, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:28 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000025, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6800}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x60000000}}}}}}}, 0x0) 14:46:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6801}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x800000000000000) 14:46:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000070, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x717e0000}}}}}}}, 0x0) 14:46:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6802}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x800e0000}}}}}}}, 0x0) 14:46:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6803}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xd000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xa00000000000000) 14:46:28 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000026, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000071, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8dffffff}}}}}}}, 0x0) 14:46:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6900}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xb3d000000000000) 14:46:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6901}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xb80b0000}}}}}}}, 0x0) 14:46:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe00000000000000) 14:46:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000072, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xe1fd0000}}}}}}}, 0x0) 14:46:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x10000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6902}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000027, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000073, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x1000000000000000) 14:46:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6903}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xe8030000}}}}}}}, 0x0) 14:46:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x12000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xf5ffffff}}}}}}}, 0x0) 14:46:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6a00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x1371000000000000) 14:46:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000074, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6a01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xfffff000}}}}}}}, 0x0) 14:46:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000028, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x2320000000000000) 14:46:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000075, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6a02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xffffff7f}}}}}}}, 0x0) 14:46:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x1f000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xffffff8d}}}}}}}, 0x0) 14:46:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6a03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x2b54000000000000) 14:46:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000076, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6b00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xfffffff5}}}}}}}, 0x0) 14:46:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000029, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3b03000000000000) 14:46:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xffffffff}}}}}}}, 0x0) 14:46:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6b01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000077, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x3f000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6b02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x3f00000000000000) 14:46:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000078, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x2}}}}}}}}}, 0x0) 14:46:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6b03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002a, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4000000000000000) 14:46:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000079, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x3}}}}}}}}}, 0x0) 14:46:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x81020000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6c00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4337000000000000) 14:46:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x4}}}}}}}}}, 0x0) 14:46:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6c01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000007a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x5}}}}}}}}}, 0x0) 14:46:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6c02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002b, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4b6b000000000000) 14:46:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x6}}}}}}}}}, 0x0) 14:46:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6c03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000007b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x85000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6d00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x7}}}}}}}}}, 0x0) 14:46:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x4f03000000000000) 14:46:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000007c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6d01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0xb}}}}}}}}}, 0x0) 14:46:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002c, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6d02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x5b1a000000000000) 14:46:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x2}}}}}}}}}, 0x0) 14:46:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000007d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xd30b0000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x6000000000000000) 14:46:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6d03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x3}}}}}}}}}, 0x0) 14:46:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000007e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6e00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x60a441fd00000000) 14:46:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002d, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x4}}}}}}}}}, 0x0) 14:46:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000082, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6e01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xe70a0000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x634e000000000000) 14:46:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6e02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x6901002000000000) 14:46:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000083, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x6}}}}}}}}}, 0x0) [ 1157.446350][ T26] kauditd_printk_skb: 35 callbacks suppressed [ 1157.446366][ T26] audit: type=1804 audit(1669128391.334:1262): pid=19678 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/820/memory.events" dev="sda1" ino=1177 res=1 errno=0 14:46:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x7901002000000000) 14:46:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6e03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1157.574866][ T26] audit: type=1800 audit(1669128391.334:1263): pid=19678 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1177 res=0 errno=0 [ 1157.677167][ T26] audit: type=1804 audit(1669128391.334:1264): pid=19678 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/820/memory.events" dev="sda1" ino=1177 res=1 errno=0 14:46:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002e, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0xe}}}}}}}}}, 0x0) 14:46:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000084, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6f00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xf4ffffff, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x7b31000000000000) 14:46:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000085, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x8365000000000000) [ 1157.846960][ T26] audit: type=1804 audit(1669128391.734:1265): pid=19708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/821/memory.events" dev="sda1" ino=1206 res=1 errno=0 14:46:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6f01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0xf}}}}}}}}}, 0x0) [ 1157.968792][ T26] audit: type=1800 audit(1669128391.734:1266): pid=19708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1206 res=0 errno=0 14:46:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x9314000000000000) 14:46:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1158.047312][ T26] audit: type=1804 audit(1669128391.734:1267): pid=19708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/821/memory.events" dev="sda1" ino=1206 res=1 errno=0 14:46:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000002f, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000086, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6f02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xfbffffff, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x2}}}}}}}}}, 0x0) 14:46:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x9b48000000000000) 14:46:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6f03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xb32b000000000000) 14:46:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x3}}}}}}}}}, 0x0) 14:46:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000087, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1158.275698][ T26] audit: type=1804 audit(1669128392.164:1268): pid=19737 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/822/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7000}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1158.379682][ T26] audit: type=1800 audit(1669128392.164:1269): pid=19737 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1207 res=0 errno=0 14:46:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xb80b000000000000) [ 1158.417956][ T26] audit: type=1804 audit(1669128392.204:1270): pid=19737 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/822/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000030, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x4}}}}}}}}}, 0x0) 14:46:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000088, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7001}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xbb5f000000000000) 14:46:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xfdfdffff, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x5}}}}}}}}}, 0x0) 14:46:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7002}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xc805000000000000) 14:46:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000089, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1158.691170][ T26] audit: type=1804 audit(1669128392.574:1271): pid=19771 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/823/memory.events" dev="sda1" ino=1197 res=1 errno=0 14:46:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xcb0e000000000000) 14:46:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7003}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000031, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x6}}}}}}}}}, 0x0) 14:46:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7100}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xd342000000000000) 14:46:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000008a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xfeffffff, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xdb76000000000000) 14:46:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7101}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x7}}}}}}}}}, 0x0) 14:46:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000008b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xdc05000000000000) 14:46:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7102}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000032, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0xb}}}}}}}}}, 0x0) 14:46:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000008c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe803000000000000) 14:46:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xff000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7103}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7200}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xe900000000000000) 14:46:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x10}}}}}}}}}, 0x0) 14:46:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000008d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xeb25000000000000) 14:46:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7201}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000033, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x11}}}}}}}}}, 0x0) 14:46:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000008e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xff010000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7202}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xf359000000000000) 14:46:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7203}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x32}}}}}}}}}, 0x0) 14:46:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xf401000000000000) 14:46:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000008f, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7300}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xf903004000000000) 14:46:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000034, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x3e}}}}}}}}}, 0x0) 14:46:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000090, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7301}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xfe03004000000000) 14:46:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xff0f0000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x60}}}}}}}}}, 0x0) 14:46:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7302}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0xffffffff00000000) 14:46:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000091, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7303}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}}}}}}}, 0x0) 14:46:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x67b}, {0x101, 0x0, 0x20, 0x2}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7400}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000035, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000092, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xff1f0000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7401}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x67b}, {0x101, 0x0, 0x20, 0x2}]}, 0x10) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x3}}}}}}}}}, 0x0) 14:46:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000093, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7402}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x67b}, {0x101, 0x0, 0x20, 0x2}]}, 0x10) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000094, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7403}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000036, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00'], 0x4c}) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) r4 = accept4$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14, 0x80000) getsockname$packet(r4, &(0x7f00000008c0), &(0x7f0000000900)=0x14) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xfffffdfd, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7500}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000095, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7501}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 14:46:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7502}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) 14:46:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7503}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000096, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000037, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7600}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000097, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r3 = syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00'], 0x4c}) (async, rerun: 32) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) (async, rerun: 32) r4 = accept4$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14, 0x80000) getsockname$packet(r4, &(0x7f00000008c0), &(0x7f0000000900)=0x14) (async) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xffffff01, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000098, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7601}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 14:46:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) 14:46:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7602}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000099, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000038, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}}, 0x0) 14:46:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xffffff7f, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7603}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r3 = syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00'], 0x4c}) (async) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) (async) r4 = accept4$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14, 0x80000) getsockname$packet(r4, &(0x7f00000008c0), &(0x7f0000000900)=0x14) (async) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000009a, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7700}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}}}, 0x0) 14:46:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xfffffff4, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000039, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7701}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}}, 0x0) 14:46:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000009b, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1163.468415][ T26] kauditd_printk_skb: 26 callbacks suppressed [ 1163.468430][ T26] audit: type=1804 audit(1669128397.354:1298): pid=20046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/832/memory.events" dev="sda1" ino=1193 res=1 errno=0 14:46:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7702}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}}}}}, 0x0) 14:46:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7703}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1163.630741][ T26] audit: type=1800 audit(1669128397.354:1299): pid=20046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1193 res=0 errno=0 [ 1163.706613][ T26] audit: type=1804 audit(1669128397.394:1300): pid=20046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/832/memory.events" dev="sda1" ino=1193 res=1 errno=0 14:46:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f0000000500)="5f4cf672ca62ff1c1ff832b822384efe748a98f5620d4b3b705df3a6dce9c3d0c53c211e896c9204b1cde99ade9de7d70476cc9a7a24f0c516de5315bfe20d0904081cb3634b36cd0563cbca48d6fd8b1b632b7e9f32aac4ec1ba6b8b752ccff271a4fed5fb7292ee17450821a03fd8db7dd145b4a6e770040133c0881547a08f9b0157a44a6e3d135d07c10710000000000000000", 0x95, 0x0, 0x0, 0x0) 14:46:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000009c, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xfffffffb, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7800}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003a, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f0000000500)="5f4cf672ca62ff1c1ff832b822384efe748a98f5620d4b3b705df3a6dce9c3d0c53c211e896c9204b1cde99ade9de7d70476cc9a7a24f0c516de5315bfe20d0904081cb3634b36cd0563cbca48d6fd8b1b632b7e9f32aac4ec1ba6b8b752ccff271a4fed5fb7292ee17450821a03fd8db7dd145b4a6e770040133c0881547a08f9b0157a44a6e3d135d07c10710000000000000000", 0x95, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) (async) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) sendto$inet(r1, &(0x7f0000000500)="5f4cf672ca62ff1c1ff832b822384efe748a98f5620d4b3b705df3a6dce9c3d0c53c211e896c9204b1cde99ade9de7d70476cc9a7a24f0c516de5315bfe20d0904081cb3634b36cd0563cbca48d6fd8b1b632b7e9f32aac4ec1ba6b8b752ccff271a4fed5fb7292ee17450821a03fd8db7dd145b4a6e770040133c0881547a08f9b0157a44a6e3d135d07c10710000000000000000", 0x95, 0x0, 0x0, 0x0) (async) 14:46:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7801}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1163.877624][ T26] audit: type=1804 audit(1669128397.764:1301): pid=20080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/833/memory.events" dev="sda1" ino=1208 res=1 errno=0 14:46:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000009d, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 14:46:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7802}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1164.019122][ T26] audit: type=1800 audit(1669128397.764:1302): pid=20080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1208 res=0 errno=0 14:46:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f0000000500)="5f4cf672ca62ff1c1ff832b822384efe748a98f5620d4b3b705df3a6dce9c3d0c53c211e896c9204b1cde99ade9de7d70476cc9a7a24f0c516de5315bfe20d0904081cb3634b36cd0563cbca48d6fd8b1b632b7e9f32aac4ec1ba6b8b752ccff271a4fed5fb7292ee17450821a03fd8db7dd145b4a6e770040133c0881547a08f9b0157a44a6e3d135d07c10710000000000000000", 0x95, 0x0, 0x0, 0x0) 14:46:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000009e, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) 14:46:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f0000000340)}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00'], 0x4c}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000ec0)=@nat={'nat\x00', 0x19, 0x4, 0x5d0, [0x200008c0, 0x0, 0x0, 0x200008f0, 0x20000b8c], 0x0, &(0x7f0000000500), &(0x7f00000008c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x5, 0x2, 0x888e, 'wg1\x00', 'veth0_to_batadv\x00', 'ip6erspan0\x00', 'veth0_vlan\x00', @random="e9ea72f96b80", [0xff, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0xff], 0x6e, 0xa6, 0x11e, [], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}], @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x7f, 0x4, 0x0, 0x0, "04b4e0cf48d453f8cbedc681a822ccbf1dae90af5d784658ca9452d94bc84bd764c5bbe34347099c3213c1950af76483b092ae813a7c6db7f2a1e08d1188671c"}}}}, {0x9, 0x44, 0x886c, 'veth0_to_bond\x00', 'batadv_slave_1\x00', 'bond_slave_1\x00', 'wg1\x00', @remote, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @broadcast, [0x0, 0xff, 0x0, 0x0, 0xff], 0xae, 0x116, 0x14e, [@mark_m={{'mark_m\x00', 0x0, 0x18}, {{0x4, 0x0, 0x3}}}], [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x20}}}], @snat={'snat\x00', 0x10, {{@remote, 0x10}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x9, 0x40, 0x15, 'syz_tun\x00', 'batadv_slave_1\x00', 'nr0\x00', 'veth1_macvtap\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff], @multicast, [0xff, 0xff], 0xee, 0x126, 0x15e, [@statistic={{'statistic\x00', 0x0, 0x18}, {{0x1, 0x1, 0xd06, 0x0, 0x8, {0x5}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{}, {0xfffffffffffff001}], 0x2, 0x1}}}], [@common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0x1}}}], @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x11, 0x8, 0x19, 'pimreg0\x00', 'tunl0\x00', 'pimreg1\x00', 'veth1_to_bridge\x00', @local, [0x80, 0xff, 0xff, 0xff, 0xff, 0xff], @random="ed88e88eec02", [0xff, 0x0, 0xff, 0x0, 0xff], 0x9e, 0x10e, 0x146, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x9, 0x1}}}], [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffd}}}}]}]}, 0x648) sendto$inet(r2, &(0x7f0000000180)="431a377b008ebacbee6d39d0c5d0039f5b0b98fa5371242806c1c57ee59d645e86221cf5198888a17f543e0b21507c1122b8c5c5f57de9121bc416", 0x3b, 0x20000010, &(0x7f0000000300)={0x2, 0x4e24, @broadcast}, 0x10) 14:46:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0xfffffffe, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7803}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1164.156609][ T26] audit: type=1804 audit(1669128397.764:1303): pid=20080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/833/memory.events" dev="sda1" ino=1208 res=1 errno=0 [ 1164.299344][ T26] audit: type=1804 audit(1669128398.184:1304): pid=20119 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/834/memory.events" dev="sda1" ino=1199 res=1 errno=0 14:46:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003b, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}}, 0x0) 14:46:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x40000000000009f, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7900}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1164.386892][ T26] audit: type=1800 audit(1669128398.214:1305): pid=20119 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1199 res=0 errno=0 14:46:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a0, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7901}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}}}, 0x0) 14:46:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f0000000340)}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00'], 0x4c}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000ec0)=@nat={'nat\x00', 0x19, 0x4, 0x5d0, [0x200008c0, 0x0, 0x0, 0x200008f0, 0x20000b8c], 0x0, &(0x7f0000000500), &(0x7f00000008c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x5, 0x2, 0x888e, 'wg1\x00', 'veth0_to_batadv\x00', 'ip6erspan0\x00', 'veth0_vlan\x00', @random="e9ea72f96b80", [0xff, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0xff], 0x6e, 0xa6, 0x11e, [], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}], @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x7f, 0x4, 0x0, 0x0, "04b4e0cf48d453f8cbedc681a822ccbf1dae90af5d784658ca9452d94bc84bd764c5bbe34347099c3213c1950af76483b092ae813a7c6db7f2a1e08d1188671c"}}}}, {0x9, 0x44, 0x886c, 'veth0_to_bond\x00', 'batadv_slave_1\x00', 'bond_slave_1\x00', 'wg1\x00', @remote, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @broadcast, [0x0, 0xff, 0x0, 0x0, 0xff], 0xae, 0x116, 0x14e, [@mark_m={{'mark_m\x00', 0x0, 0x18}, {{0x4, 0x0, 0x3}}}], [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x20}}}], @snat={'snat\x00', 0x10, {{@remote, 0x10}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x9, 0x40, 0x15, 'syz_tun\x00', 'batadv_slave_1\x00', 'nr0\x00', 'veth1_macvtap\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff], @multicast, [0xff, 0xff], 0xee, 0x126, 0x15e, [@statistic={{'statistic\x00', 0x0, 0x18}, {{0x1, 0x1, 0xd06, 0x0, 0x8, {0x5}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{}, {0xfffffffffffff001}], 0x2, 0x1}}}], [@common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0x1}}}], @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x11, 0x8, 0x19, 'pimreg0\x00', 'tunl0\x00', 'pimreg1\x00', 'veth1_to_bridge\x00', @local, [0x80, 0xff, 0xff, 0xff, 0xff, 0xff], @random="ed88e88eec02", [0xff, 0x0, 0xff, 0x0, 0xff], 0x9e, 0x10e, 0x146, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x9, 0x1}}}], [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffd}}}}]}]}, 0x648) sendto$inet(r2, &(0x7f0000000180)="431a377b008ebacbee6d39d0c5d0039f5b0b98fa5371242806c1c57ee59d645e86221cf5198888a17f543e0b21507c1122b8c5c5f57de9121bc416", 0x3b, 0x20000010, &(0x7f0000000300)={0x2, 0x4e24, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) (async) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f0000000340)}, 0x10) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000100), 0x80) (async) syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="ad6496826d98c3dff32a8d38ab1d6709e5763ab0d221005769706451f99e25e8cc08526dcad55d2500b0881996c2a75d06bd48c97c92f38733186ed875f24bb7c406ca72bdf87fab737e9fa9fe93430d1f96c3b3d838f5f15d1ef52268a2199e7a414f957cad45827640b964794969b885441b8a2cf2cb5b5393ed8550a500836758c9dc603f40033d9220467fba15337346e02337e7283e4e35ef050cdecabd4a80e6375e77bfe8083334ed998b96f55c87c393811798515bc2b1230dd71d4b6f5ad548f5636de47964bef9d728016201475b4d9c5efeeb9b07e234d395cc34ee7f4f31fa25757d397d46def313231868957591ea1239d49a511de316e0636c231076ff201becb158cfd956bccd6e384e7624671310d2bc2290758c47172223589e677a0424ae8ca093123cf7fdedf0ced24d07ea5e495afc88de20e68edc48d9a61b7a61e5f9e606915ea8474cc7a52cffff21242f20da4ffc18e1f5063e05c2a59017bae7fe4510f5f5c34ee560e8ca90e98ce102038c0d4292f2f68c03ba6b465ff8c1d61b6cd7d38a1eea32184186e1ac693ded36307e4c3c02dfaf063a67564f5501e74080a6c913a93c7a430091aadd1669e79b76420c2f4e4acd947cd6f29f0cbabafedb4f9d4e26b2c81d9f58be361dd25dc2ce767e1c438b8ff312b6a02f4c833b4008655b2c5ea8942dc0526f8c") (async) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00'], 0x4c}) (async) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000ec0)=@nat={'nat\x00', 0x19, 0x4, 0x5d0, [0x200008c0, 0x0, 0x0, 0x200008f0, 0x20000b8c], 0x0, &(0x7f0000000500), &(0x7f00000008c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x5, 0x2, 0x888e, 'wg1\x00', 'veth0_to_batadv\x00', 'ip6erspan0\x00', 'veth0_vlan\x00', @random="e9ea72f96b80", [0xff, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0xff], 0x6e, 0xa6, 0x11e, [], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}], @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x7f, 0x4, 0x0, 0x0, "04b4e0cf48d453f8cbedc681a822ccbf1dae90af5d784658ca9452d94bc84bd764c5bbe34347099c3213c1950af76483b092ae813a7c6db7f2a1e08d1188671c"}}}}, {0x9, 0x44, 0x886c, 'veth0_to_bond\x00', 'batadv_slave_1\x00', 'bond_slave_1\x00', 'wg1\x00', @remote, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @broadcast, [0x0, 0xff, 0x0, 0x0, 0xff], 0xae, 0x116, 0x14e, [@mark_m={{'mark_m\x00', 0x0, 0x18}, {{0x4, 0x0, 0x3}}}], [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x20}}}], @snat={'snat\x00', 0x10, {{@remote, 0x10}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x9, 0x40, 0x15, 'syz_tun\x00', 'batadv_slave_1\x00', 'nr0\x00', 'veth1_macvtap\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff], @multicast, [0xff, 0xff], 0xee, 0x126, 0x15e, [@statistic={{'statistic\x00', 0x0, 0x18}, {{0x1, 0x1, 0xd06, 0x0, 0x8, {0x5}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{}, {0xfffffffffffff001}], 0x2, 0x1}}}], [@common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0x1}}}], @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x11, 0x8, 0x19, 'pimreg0\x00', 'tunl0\x00', 'pimreg1\x00', 'veth1_to_bridge\x00', @local, [0x80, 0xff, 0xff, 0xff, 0xff, 0xff], @random="ed88e88eec02", [0xff, 0x0, 0xff, 0x0, 0xff], 0x9e, 0x10e, 0x146, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x9, 0x1}}}], [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffd}}}}]}]}, 0x648) (async) sendto$inet(r2, &(0x7f0000000180)="431a377b008ebacbee6d39d0c5d0039f5b0b98fa5371242806c1c57ee59d645e86221cf5198888a17f543e0b21507c1122b8c5c5f57de9121bc416", 0x3b, 0x20000010, &(0x7f0000000300)={0x2, 0x4e24, @broadcast}, 0x10) (async) [ 1164.533844][ T26] audit: type=1804 audit(1669128398.214:1306): pid=20119 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/834/memory.events" dev="sda1" ino=1199 res=1 errno=0 14:46:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a1, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x4000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}}, 0x0) 14:46:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7902}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1164.731220][ T26] audit: type=1804 audit(1669128398.614:1307): pid=20154 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/835/memory.events" dev="sda1" ino=1212 res=1 errno=0 14:46:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003c, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7903}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}}}}}, 0x0) 14:46:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a2, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x10000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}, 0x0) 14:46:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7a00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f0000000340)}, 0x10) (async, rerun: 32) r1 = socket$inet_udp(0x2, 0x2, 0x0) (rerun: 32) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async, rerun: 32) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r3 = syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00', '/dev/snd/controlC#\x00'], 0x4c}) (async) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000ec0)=@nat={'nat\x00', 0x19, 0x4, 0x5d0, [0x200008c0, 0x0, 0x0, 0x200008f0, 0x20000b8c], 0x0, &(0x7f0000000500), &(0x7f00000008c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x5, 0x2, 0x888e, 'wg1\x00', 'veth0_to_batadv\x00', 'ip6erspan0\x00', 'veth0_vlan\x00', @random="e9ea72f96b80", [0xff, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0xff], 0x6e, 0xa6, 0x11e, [], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}], @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x7f, 0x4, 0x0, 0x0, "04b4e0cf48d453f8cbedc681a822ccbf1dae90af5d784658ca9452d94bc84bd764c5bbe34347099c3213c1950af76483b092ae813a7c6db7f2a1e08d1188671c"}}}}, {0x9, 0x44, 0x886c, 'veth0_to_bond\x00', 'batadv_slave_1\x00', 'bond_slave_1\x00', 'wg1\x00', @remote, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @broadcast, [0x0, 0xff, 0x0, 0x0, 0xff], 0xae, 0x116, 0x14e, [@mark_m={{'mark_m\x00', 0x0, 0x18}, {{0x4, 0x0, 0x3}}}], [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x20}}}], @snat={'snat\x00', 0x10, {{@remote, 0x10}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x9, 0x40, 0x15, 'syz_tun\x00', 'batadv_slave_1\x00', 'nr0\x00', 'veth1_macvtap\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff], @multicast, [0xff, 0xff], 0xee, 0x126, 0x15e, [@statistic={{'statistic\x00', 0x0, 0x18}, {{0x1, 0x1, 0xd06, 0x0, 0x8, {0x5}}}}, @connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{}, {0xfffffffffffff001}], 0x2, 0x1}}}], [@common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0x1}}}], @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x11, 0x8, 0x19, 'pimreg0\x00', 'tunl0\x00', 'pimreg1\x00', 'veth1_to_bridge\x00', @local, [0x80, 0xff, 0xff, 0xff, 0xff, 0xff], @random="ed88e88eec02", [0xff, 0x0, 0xff, 0x0, 0xff], 0x9e, 0x10e, 0x146, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0x9, 0x1}}}], [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}], @arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffd}}}}]}]}, 0x648) sendto$inet(r2, &(0x7f0000000180)="431a377b008ebacbee6d39d0c5d0039f5b0b98fa5371242806c1c57ee59d645e86221cf5198888a17f543e0b21507c1122b8c5c5f57de9121bc416", 0x3b, 0x20000010, &(0x7f0000000300)={0x2, 0x4e24, @broadcast}, 0x10) 14:46:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a3, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7a01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}}}}}}}}, 0x0) 14:46:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x20000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003d, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7a02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}}}}}}}}, 0x0) 14:46:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a4, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32}}}}}}}}}, 0x0) 14:46:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7a03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a5, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e}}}}}}}}}, 0x0) 14:46:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7b00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) (async) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x20020000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a6, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}}}}}}}}, 0x0) 14:46:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7b01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:42 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x40000000000003e, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) (async) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x2}}}}}}}}, 0x0) 14:46:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7b02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a7, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f0000000180)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0xfffffffffffffde5}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b2762533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c593f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") fsmount(r2, 0x0, 0x73) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '^97c', '/dev/snd/controlC#\x00', '/dev/snd/c\x01\x04\x00\x00\x00\x00\x00\x00\x00'], 0x3d}) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, &(0x7f00000008c0)=0x2, 0x4) recvfrom$packet(r2, &(0x7f0000000500)=""/240, 0xf0, 0x40010001, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x1, 0x80, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}}, 0x14) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x3}}}}}}}}, 0x0) 14:46:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7b03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x80000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a8, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7c00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x4}}}}}}}}, 0x0) 14:46:42 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000041, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7c01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000a9, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x6}}}}}}}}, 0x0) 14:46:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f0000000180)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0xfffffffffffffde5}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b2762533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c593f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") fsmount(r2, 0x0, 0x73) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '^97c', '/dev/snd/controlC#\x00', '/dev/snd/c\x01\x04\x00\x00\x00\x00\x00\x00\x00'], 0x3d}) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, &(0x7f00000008c0)=0x2, 0x4) recvfrom$packet(r2, &(0x7f0000000500)=""/240, 0xf0, 0x40010001, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x1, 0x80, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}}, 0x14) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) (async) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f0000000180)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0xfffffffffffffde5}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b2762533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c593f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) pipe2$watch_queue(&(0x7f0000000100), 0x80) (async) syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") (async) fsmount(r2, 0x0, 0x73) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '^97c', '/dev/snd/controlC#\x00', '/dev/snd/c\x01\x04\x00\x00\x00\x00\x00\x00\x00'], 0x3d}) (async) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, &(0x7f00000008c0)=0x2, 0x4) (async) recvfrom$packet(r2, &(0x7f0000000500)=""/240, 0xf0, 0x40010001, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x1, 0x80, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}}, 0x14) (async) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) (async) 14:46:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x100000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0xe}}}}}}}}, 0x0) [ 1168.728943][ T26] kauditd_printk_skb: 14 callbacks suppressed [ 1168.728959][ T26] audit: type=1804 audit(1669128402.614:1322): pid=20282 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/840/memory.events" dev="sda1" ino=1202 res=1 errno=0 14:46:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7c02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000aa, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7c03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1168.872947][ T26] audit: type=1800 audit(1669128402.614:1323): pid=20282 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1202 res=0 errno=0 14:46:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0xf}}}}}}}}, 0x0) 14:46:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000ab, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1168.976955][ T26] audit: type=1804 audit(1669128402.614:1324): pid=20282 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/840/memory.events" dev="sda1" ino=1202 res=1 errno=0 14:46:43 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000042, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7d00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x100000200000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x10}}}}}}}}, 0x0) [ 1169.228478][ T26] audit: type=1804 audit(1669128403.114:1325): pid=20317 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/841/memory.events" dev="sda1" ino=1196 res=1 errno=0 [ 1169.292098][ T26] audit: type=1800 audit(1669128403.144:1326): pid=20317 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1196 res=0 errno=0 [ 1169.318747][ T26] audit: type=1804 audit(1669128403.144:1327): pid=20317 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/841/memory.events" dev="sda1" ino=1196 res=1 errno=0 14:46:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7d01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f0000000180)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0xfffffffffffffde5}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b2762533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c593f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r3 = syz_clone(0x50884080, &(0x7f0000000580)="775efddceedde821182772288f250225bba1ad5d9e75156c4c9312b8b68c813b9a6f26c692d9560df6572f34608bdfd90d79355fa6ee1338003bd466b32ca00772ce0c343767d860eff10133c49784d5b4693918ca0b5e801d4cb98ab2fa2b9370e8d1aba623408f1684def8780cbc69f1c436a7b7e000000000000000000000002ff53a95e14180cd37dfaf47dc4983fc57e8e633101f9d2ba59d7081ec982044010000800000000006b79ab2d526d374e6cdc3d1e95889cfc0d632ffbb7244cba0f94c4e0d5b45aa2f13464e2f8548912dcc77c724eb9cbffea956e6", 0xdd, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000680)="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") fsmount(r2, 0x0, 0x73) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0xa, 0x4, 0x7cf, 0x60000000, 'syz0\x00', 0x400}, 0x2, 0x20, 0xc, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000300)=['/dev/snd/controlC#\x00', '^97c', '/dev/snd/controlC#\x00', '/dev/snd/c\x01\x04\x00\x00\x00\x00\x00\x00\x00'], 0x3d}) (async) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, &(0x7f00000008c0)=0x2, 0x4) recvfrom$packet(r2, &(0x7f0000000500)=""/240, 0xf0, 0x40010001, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x1, 0x80, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}}, 0x14) (async) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000ac, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x30b}}}}}}}}, 0x0) 14:46:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x120000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000043, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7d02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x337}}}}}}}}, 0x0) [ 1170.636037][ T26] audit: type=1804 audit(1669128404.524:1328): pid=20334 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/842/memory.events" dev="sda1" ino=1204 res=1 errno=0 14:46:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7d03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000ad, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0xc800}}}}}}}}, 0x0) [ 1170.733692][ T26] audit: type=1800 audit(1669128404.554:1329): pid=20334 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1204 res=0 errno=0 14:46:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7e00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0xffffff1f}}}}}}}}, 0x0) [ 1170.844460][ T26] audit: type=1804 audit(1669128404.554:1330): pid=20334 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/842/memory.events" dev="sda1" ino=1204 res=1 errno=0 14:46:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, 0x0, &(0x7f0000000240)) preadv(r1, &(0x7f0000000180), 0x0, 0x5, 0x2d5) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r2, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r2, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000ae, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x200000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7e01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:46:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000044, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7e02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7e03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, 0x0, &(0x7f0000000240)) preadv(r1, &(0x7f0000000180), 0x0, 0x5, 0x2d5) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r2, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r2, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x2}}}}}}}}}, 0x0) [ 1172.166280][ T26] audit: type=1804 audit(1669128406.054:1331): pid=20371 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/843/memory.events" dev="sda1" ino=1207 res=1 errno=0 14:46:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000af, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7f00}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3}}}}}}}}}, 0x0) 14:46:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, 0x0, &(0x7f0000000240)) preadv(r1, &(0x7f0000000180), 0x0, 0x5, 0x2d5) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) (async, rerun: 64) r2 = socket$inet_udp(0x2, 0x2, 0x0) (rerun: 64) bind$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async, rerun: 64) sendmmsg$inet(r2, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async, rerun: 64) sendto$inet(r2, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x300000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7f01}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x4}}}}}}}}}, 0x0) 14:46:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b0, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7f02}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000045, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x5}}}}}}}}}, 0x0) 14:46:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) r2 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, 0x0, &(0x7f0000000240)) read(r2, &(0x7f0000000500)=""/205, 0xcd) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x6}}}}}}}}}, 0x0) 14:46:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x7f03}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b1, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x7}}}}}}}}}, 0x0) 14:46:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x400000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) r2 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, 0x0, &(0x7f0000000240)) read(r2, &(0x7f0000000500)=""/205, 0xcd) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) (async) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) socket$xdp(0x2c, 0x3, 0x0) (async) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, 0x0, &(0x7f0000000240)) (async) read(r2, &(0x7f0000000500)=""/205, 0xcd) (async) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) (async) 14:46:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8002}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b2, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xb}}}}}}}}}, 0x0) 14:46:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000046, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) r2 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, 0x0, &(0x7f0000000240)) (async) read(r2, &(0x7f0000000500)=""/205, 0xcd) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) 14:46:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8003}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x10}}}}}}}}}, 0x0) 14:46:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b3, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x500000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180), 0x50800, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000300)=@req3={0x5, 0x746a, 0xfffffafa, 0x6, 0x6, 0x5ff8, 0xffffffe0}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r2, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r2, &(0x7f0000000480)="e9", 0x1, 0x0, 0x0, 0x0) 14:46:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8100}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x11}}}}}}}}}, 0x0) 14:46:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b4, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) (async) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180), 0x50800, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000300)=@req3={0x5, 0x746a, 0xfffffafa, 0x6, 0x6, 0x5ff8, 0xffffffe0}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r2, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) sendto$inet(r2, &(0x7f0000000480)="e9", 0x1, 0x0, 0x0, 0x0) 14:46:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8101}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1173.333523][ T27] INFO: task kworker/0:1:14 blocked for more than 144 seconds. [ 1173.347697][ T27] Not tainted 6.1.0-rc6-syzkaller #0 [ 1173.381566][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1173.402883][ T27] task:kworker/0:1 state:D stack:25496 pid:14 ppid:2 flags:0x00004000 [ 1173.422935][ T27] Workqueue: usb_hub_wq hub_event [ 1173.428005][ T27] Call Trace: 14:46:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000047, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x32}}}}}}}}}, 0x0) 14:46:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b5, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) (async) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180), 0x50800, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000300)=@req3={0x5, 0x746a, 0xfffffafa, 0x6, 0x6, 0x5ff8, 0xffffffe0}, 0x1c) (async) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) (async) sendmmsg$inet(r2, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) (async) sendto$inet(r2, &(0x7f0000000480)="e9", 0x1, 0x0, 0x0, 0x0) 14:46:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x600000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8102}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1173.431292][ T27] [ 1173.442896][ T27] __schedule+0xae9/0x53f0 [ 1173.447363][ T27] ? find_held_lock+0x2d/0x110 [ 1173.458415][ T27] ? wq_worker_sleeping+0x1e9/0x250 [ 1173.463838][ T27] ? mark_lock.part.0+0x18d2/0x1910 [ 1173.469151][ T27] ? io_schedule_timeout+0x150/0x150 14:46:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8103}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1173.509201][ T27] ? lockdep_hardirqs_on+0x7d/0x100 14:46:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b6, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8200}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1173.530284][ T27] schedule+0xde/0x1b0 [ 1173.534715][ T27] usb_kill_urb.part.0+0x19a/0x220 [ 1173.542956][ T27] ? usb_anchor_suspend_wakeups+0x40/0x40 [ 1173.558575][ T27] ? prepare_to_wait_exclusive+0x2c0/0x2c0 [ 1173.569665][ T27] usb_kill_urb+0x83/0xa0 [ 1173.586347][ T27] usb_start_wait_urb+0x24a/0x4b0 [ 1173.602223][ T27] ? usb_api_blocking_completion+0xa0/0xa0 [ 1173.615483][ T27] ? memset+0x24/0x50 [ 1173.626007][ T27] usb_control_msg+0x320/0x4a0 14:46:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8201}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1173.631975][ T27] ? usb_start_wait_urb+0x4b0/0x4b0 [ 1173.645236][ T27] hub_port_init+0x868/0x34a0 [ 1173.659208][ T27] hub_event+0x24d5/0x45d0 [ 1173.670467][ T27] ? hub_port_debounce+0x3b0/0x3b0 14:46:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b7, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8202}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1173.685397][ T27] ? lock_release+0x810/0x810 [ 1173.701613][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 1173.725621][ T27] ? do_raw_spin_lock+0x124/0x2b0 [ 1173.744914][ T27] process_one_work+0x9bf/0x1710 [ 1173.760561][ T27] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 1173.774297][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 1173.780188][ T27] ? _raw_spin_lock_irq+0x45/0x50 [ 1173.796676][ T27] worker_thread+0x669/0x1090 [ 1173.804104][ T27] ? process_one_work+0x1710/0x1710 [ 1173.823168][ T27] kthread+0x2e8/0x3a0 [ 1173.834523][ T27] ? kthread_complete_and_exit+0x40/0x40 [ 1173.854675][ T27] ret_from_fork+0x1f/0x30 14:46:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000048, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) [ 1173.878442][ T27] [ 1173.903471][ T27] INFO: task kworker/0:2:3730 blocked for more than 145 seconds. [ 1173.915182][ T27] Not tainted 6.1.0-rc6-syzkaller #0 [ 1173.921021][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1173.934552][ T27] task:kworker/0:2 state:D stack:25352 pid:3730 ppid:2 flags:0x00004000 [ 1173.946202][ T27] Workqueue: usb_hub_wq hub_event [ 1173.951513][ T27] Call Trace: [ 1173.960103][ T27] [ 1173.965209][ T27] __schedule+0xae9/0x53f0 [ 1173.969667][ T27] ? find_held_lock+0x2d/0x110 [ 1173.975224][ T27] ? wq_worker_sleeping+0x1e9/0x250 [ 1173.980647][ T27] ? mark_lock.part.0+0x18d2/0x1910 [ 1173.986413][ T27] ? io_schedule_timeout+0x150/0x150 [ 1173.991772][ T27] ? lockdep_hardirqs_on+0x7d/0x100 [ 1173.997456][ T27] schedule+0xde/0x1b0 [ 1174.001563][ T27] usb_kill_urb.part.0+0x19a/0x220 [ 1174.008235][ T27] ? usb_anchor_suspend_wakeups+0x40/0x40 [ 1174.015560][ T27] ? prepare_to_wait_exclusive+0x2c0/0x2c0 [ 1174.021434][ T27] usb_kill_urb+0x83/0xa0 [ 1174.026264][ T27] usb_start_wait_urb+0x24a/0x4b0 [ 1174.031325][ T27] ? usb_api_blocking_completion+0xa0/0xa0 [ 1174.037767][ T27] ? memset+0x24/0x50 [ 1174.041806][ T27] usb_control_msg+0x320/0x4a0 [ 1174.047040][ T27] ? usb_start_wait_urb+0x4b0/0x4b0 [ 1174.052372][ T27] hub_port_init+0x868/0x34a0 [ 1174.058989][ T27] hub_event+0x24d5/0x45d0 [ 1174.063797][ T27] ? hub_port_debounce+0x3b0/0x3b0 [ 1174.071758][ T27] ? lock_release+0x810/0x810 [ 1174.076950][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 1174.081935][ T27] ? do_raw_spin_lock+0x124/0x2b0 [ 1174.087551][ T27] process_one_work+0x9bf/0x1710 [ 1174.092608][ T27] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 1174.098544][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 1174.103950][ T27] ? _raw_spin_lock_irq+0x45/0x50 [ 1174.109091][ T27] worker_thread+0x669/0x1090 [ 1174.116927][ T27] ? __kthread_parkme+0x163/0x220 [ 1174.122063][ T27] ? process_one_work+0x1710/0x1710 [ 1174.127961][ T27] kthread+0x2e8/0x3a0 [ 1174.132131][ T27] ? kthread_complete_and_exit+0x40/0x40 [ 1174.138321][ T27] ret_from_fork+0x1f/0x30 [ 1174.144063][ T27] [ 1174.150417][ T27] 14:46:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x9}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@random="8b8154ef00", @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "10f700", 0x44, 0x2f, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3e}}}}}}}}}, 0x0) 14:46:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8203}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) 14:46:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b8, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x700000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) 14:46:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="92d57116e3c1f30d05aea34c24f63f09d2107cbd148ac3fc4809d8174c22196bb76bc7d5d7f6eec60e16a433f61eea3dc67e057f1f9afacc1d5dcecd3d79f10fcc67060dad5fcef1d1f1382d05fbc0c034e7ee06c60651487d32c513195eefe5ab9093fb6523b3e10adc555e6a7e2e8becc91becfc28715b3e52ce092661a989d5d19704fab6496f935ad87e746788c763983d969bec112792a6357b9c5202708e1c331c8f84122bccbdcbce8a35358a7745538766142fb83224b1", 0xbb}, {&(0x7f00000001c0)="77d0", 0x2}, {&(0x7f0000000200)="43919d047f18ae91587544e627199f9ecd04c4b3106b93299ae6df047563bbcde99675643d0bb0edf01b763be92852fc85adf1abc07b320f8ec09171faea7063", 0x40}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000800)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4a13d3b087a76523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa6e89d36ef1911a9bb74701cbf316d82667ce3ed", 0x95}], 0x5}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f00000004c0)="e9", 0x7a15, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x40, 0x8000, 0x5, 0x7, {{0x17, 0x4, 0x3, 0x5, 0x5c, 0x66, 0x0, 0x3, 0x2f, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@rr={0x7, 0x1f, 0xc9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @local, @rand_addr=0x64010102, @multicast1, @private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x24, 0x39, 0x0, 0x8, [0x80000000, 0x6d, 0x9, 0xfffffff8, 0x4, 0x10001, 0x3, 0x6]}, @ra={0x94, 0x4, 0x1}]}}}}}) bind$packet(r2, &(0x7f0000000300)={0x11, 0x1, r3, 0x1, 0x3f, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x29}}, 0x14) [ 1174.150417][ T27] Showing all locks held in the system: 14:46:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8300}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1174.192920][ T27] 1 lock held by rcu_tasks_kthre/12: [ 1174.202711][ T26] kauditd_printk_skb: 14 callbacks suppressed [ 1174.202725][ T26] audit: type=1804 audit(1669128408.084:1346): pid=20523 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/848/memory.events" dev="sda1" ino=1177 res=1 errno=0 14:46:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000049, 0x2b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) syz_mount_image$ext4(&(0x7f0000002640)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) 14:46:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8301}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1174.214551][ T27] #0: ffffffff8c58f0f0 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc70 14:46:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000b9, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1174.338123][ T26] audit: type=1800 audit(1669128408.124:1347): pid=20523 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1177 res=0 errno=0 [ 1174.384734][ T27] 1 lock held by rcu_tasks_trace/13: 14:46:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x8302}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) [ 1174.414594][ T27] #0: ffffffff8c58edf0 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc70 [ 1174.420235][ T26] audit: type=1804 audit(1669128408.124:1348): pid=20523 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/848/memory.events" dev="sda1" ino=1177 res=1 errno=0 [ 1174.448505][ T27] 5 locks held by kworker/0:1/14: 14:46:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x4000000000000ba, 0x2b, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1174.483721][ T27] #0: ffff888145a2fd38 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x86d/0x1710 14:46:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) pwritev(r2, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x0, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000280)={0x0, 0x0, 0x800000000000000, 0x2000001}) sendfile(r4, r1, 0x0, 0x100000001) [ 1174.532377][ T27] #1: ffffc90000137da8 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x8a1/0x1710 [ 1174.595368][ T27] #2: ffff888148486190 (&dev->mutex){....}-{3:3}, at: hub_event+0x1c0/0x45d0 [ 1174.616256][ T27] #3: ffff8881485294f8 (&port_dev->status_lock){+.+.}-{3:3}, at: hub_event+0x20fd/0x45d0 [ 1174.632611][ T26] audit: type=1804 audit(1669128408.514:1349): pid=20551 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/849/memory.events" dev="sda1" ino=1206 res=1 errno=0 [ 1174.653266][ T27] #4: ffff8881484e0068 (hcd->address0_mutex){+.+.}-{3:3}, at: hub_event+0x2124/0x45d0 [ 1174.695416][ T27] 1 lock held by khungtaskd/27: [ 1174.697209][ T26] audit: type=1800 audit(1669128408.544:1350): pid=20551 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1206 res=0 errno=0 [ 1174.712009][ T27] #0: [ 1174.750575][ T26] audit: type=1804 audit(1669128408.544:1351): pid=20551 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3971860950/syzkaller.nPgd6i/849/memory.events" dev="sda1" ino=1206 res=1 errno=0 [ 1174.752408][ T27] ffffffff8c58fc40 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x57/0x264 [ 1174.834100][ T27] 2 locks held by kworker/1:2/1801: [ 1174.845259][ T27] #0: ffff888012066538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x86d/0x1710 [ 1174.855827][ T27] #1: ffffc90005a37da8 ((work_completion)(&rew->rew_work)){+.+.}-{0:0}, at: process_one_work+0x8a1/0x1710 [ 1174.867348][ T27] 2 locks held by getty/3308: [ 1174.872038][ T27] #0: ffff888027974098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x26/0x80 [ 1174.881911][ T27] #1: ffffc900031262f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xef4/0x13e0 [ 1174.892634][ T27] 5 locks held by kworker/0:2/3730: [ 1174.897925][ T27] #0: ffff888145a2fd38 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x86d/0x1710 [ 1174.908979][ T27] #1: ffffc900043efda8 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x8a1/0x1710 [ 1174.920326][ T27] #2: ffff88814838e190 (&dev->mutex){....}-{3:3}, at: hub_event+0x1c0/0x45d0 [ 1174.929300][ T27] #3: ffff8881484214f8 (&port_dev->stat