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") 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180), 0x0, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x10}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19", 0x35}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005f00)=[{{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000900)="d2", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000001240)="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", 0x4bb}], 0x1}}], 0x2, 0x0) 03:36:52 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x44}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180), 0x0, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19", 0x35}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:52 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x0) [ 1661.607007][ T497] syz-executor.4[497]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:36:52 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00'}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x8f00000000000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19", 0x35}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:52 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00'}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xf6ffffff00000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) [ 1661.757082][ T508] wg1 speed is unknown, defaulting to 1000 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9d", 0x50}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:52 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00'}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xfcfdffff00000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 1: r0 = socket(0x200000100000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'vlan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001040)=ANY=[@ANYBLOB="09030000f63e"], 0x3f00}], 0x1}, 0x0) 03:36:52 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xfd5b000000000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9d", 0x50}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xfdfdffff00000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:52 executing program 1: pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)="db17b7791f173a30740c17", 0xb}], 0x1, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000080)="dc", 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="2c00000084000000"], 0x2c}, 0x0) 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:52 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9d", 0x50}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xfefdffff00000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x0, 0x1, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:52 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e7", 0x5d}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='mqueue\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x1096020, 0x0) getdents64(r0, &(0x7f0000000000)=""/72, 0x48) 03:36:52 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x0, 0x1, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xfeffffff00000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:52 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e7", 0x5d}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:52 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:52 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000140)=0x800, 0x4) recvmmsg(r3, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/49, 0x31}], 0x1}}], 0x1, 0x0, 0x0) r4 = dup(r2) sendmmsg(r4, &(0x7f0000001d40)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)="9c", 0x1}], 0x1}}], 0x1, 0x0) 03:36:52 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xfeffffffffffffff, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:53 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x0, 0x1, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e7", 0x5d}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:53 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:53 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:53 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x0, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:53 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0xb}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xff01000000000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:53 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x10}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245", 0x64}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r0, 0x1) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="b2d74a1c00dbcc", @ANYRES16, @ANYBLOB="000126bd7000fcdbdf251200000008003100090000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8001) 03:36:53 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x0, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:53 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xfffdffff00000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:53 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x2f}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245", 0x64}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:53 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245", 0x64}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:53 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x3c}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:53 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x0, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000700)='veno\x00', 0x5) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001000)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000a00)='1', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000005f00)=[{{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000900)="d2", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000001240)="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", 0x303}], 0x1}}], 0x2, 0x0) 03:36:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xffffffff00000000, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005f00)=[{{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000980)="f1", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000001240)="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", 0x4bb}], 0x1}}], 0x2, 0x0) 03:36:53 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x289}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:53 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:53 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100), 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:54 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f940", 0x67}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x80}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="380fb0"], 0x8) 03:36:54 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10, 0xe000}, 0x5}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/102, 0x66) 03:36:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xffffffffffff0700, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:54 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x300}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:54 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100), 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:54 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/102, 0x66) 03:36:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xffffffffffffff7f, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:54 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/102, 0x66) 03:36:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f940", 0x67}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:54 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100), 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:54 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x3e8}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:54 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/102, 0x66) 03:36:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xfffffffffffffffe, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:54 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:54 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(r0, 0x0, 0x0) 03:36:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f940", 0x67}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000280)=0x27fe, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xc8a5, 0x700}, 0x1700) 03:36:54 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x500}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:54 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x543}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd2", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000700)='veno\x00', 0x5) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000005f00)=[{{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000900)="d2495a99820ab82abb3e946dd6db270c527d4d6ca06bd5498280da768df4c2433b4c48cac1d225f5bb84d902c93870e860cb7d1a9322a4c1bda8bd906c301b3048797123fe8bb0500dceb442b69a74a422517773c4ca3c4012", 0x59}, {&(0x7f0000000980)="f1231fbe04b6500ef4143939a6578ed773cd33ac12d040b7f2382be94b785cc11dd421e0e278004d232895c9e4f457d26b939368afd7f11c1841c7cafe2833444b059a1f826590e45a72fa41d0977fb9c8cc2b4d8b2ddd8b052bd68c74919a23de0efb5e0369b4b0059531e5", 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000001240)="329bc31660472aa0639cb1f64988bf02bb054a07edad436adc41b75db601f630dd907fcc2ba2d1bf85d514e2109bdd9e2bbd8bada8cb5daa453f3b48915182c3baa758b2807c39d8fe39595e5958d307065b07f4bed9b2bbd67799080c38e2a9d6639406c356dc41b26a64fd0ba0", 0x6e}], 0x1}}], 0x2, 0x0) 03:36:54 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:54 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(r0, 0x0, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x600}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1664.378622][ T708] __do_sys_memfd_create: 13 callbacks suppressed [ 1664.378645][ T708] syz-executor.4[708]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, &(0x7f0000000180)={&(0x7f0000000080), 0x2, &(0x7f00000000c0)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 03:36:55 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "e4"}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) read(r0, 0x0, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd2", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bdbd"], 0x3000}], 0x1}, 0x0) 03:36:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x608}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd2", 0x69}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x689}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, 0x0, 0x0) 03:36:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 1664.547155][ T733] syz-executor.4[733]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x2}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x700}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, 0x0, 0x0) 03:36:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) [ 1664.618356][ T747] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, 0x0, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x806}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1664.692016][ T759] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1664.696616][ T756] syz-executor.4[756]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:36:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) 03:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x3}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:55 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, 0x0}, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x810}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, 0x0}, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0xb00}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1664.810615][ T774] syz-executor.4[774]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1664.821739][ T775] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) 03:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x4}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:55 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, 0x0}, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0xe80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x1008}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1664.951667][ T793] syz-executor.4[793]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1664.955458][ T789] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x5}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:55 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:55 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x2000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x6}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") [ 1665.053898][ T808] syz-executor.4[808]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:55 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x2f00}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:36:55 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) [ 1665.130368][ T817] syz-executor.4[817]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x7}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x2f89}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{0x0, 0x3000}], 0x1}, 0x0) 03:36:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x3580}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1665.250044][ T837] syz-executor.4[837]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{0x0, 0x3000}], 0x1}, 0x0) 03:36:55 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) 03:36:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x3c00}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x8}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:55 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a32000000000500010007"], 0x7c}}, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eae", 0x34}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{0x0, 0x3000}], 0x1}, 0x0) 03:36:55 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x4305}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eae", 0x34}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:36:55 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[], 0x3000}], 0x1}, 0x0) [ 1665.436216][ T863] syz-executor.4[863]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x9}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x4788}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eae", 0x34}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x4888}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc", 0x4e}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 1665.565556][ T884] syz-executor.4[884]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0xa}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x6488}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc", 0x4e}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x800e}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0xb}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x8035}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0xc}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x8100}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc", 0x4e}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe0688"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0xd}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x8847}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe0688"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x7c}}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac67", 0x5b}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x8848}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe0688"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x7c}}, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x7, 0x6, 0x201}, 0x14}}, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0xe}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x8864}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x7c}}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac67", 0x5b}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x7, 0x6, 0x201}, 0x14}}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a6"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x7c}}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x8902}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a6"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac67", 0x5b}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x7, 0x6, 0x201}, 0x14}}, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x10}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x7c}}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x8906}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r2, 0x1}, 0x14}}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666b", 0x61}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x11}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x7c}}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a6"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000000711"], 0x44}}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0x892f}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x7c}}, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x12}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a8"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666b", 0x61}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2, 0xe803}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1666.285132][ T1001] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. 03:36:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="98030000", @ANYRES16=r2, @ANYBLOB="010028057000fcdbc8253b00000008000300", @ANYRES32=r3, @ANYBLOB="04008e00080057001b0a000004006c000500190107000000080026006c090000560333"], 0x398}}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x7c}}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a8"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x7c}}, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x13}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666b", 0x61}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a8"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005"], 0x7c}}, 0x0) [ 1666.431964][ T1024] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23", 0x64}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:56 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={0x0}}, 0x0) 03:36:56 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec"], 0x3000}], 0x1}, 0x0) 03:36:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x18}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:56 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23", 0x64}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 1: r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec"], 0x3000}], 0x1}, 0x0) [ 1666.534163][ T1038] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x25}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005"], 0x7c}}, 0x0) 03:36:57 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec"], 0x3000}], 0x1}, 0x0) 03:36:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x9}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23", 0x64}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e"], 0x3000}], 0x1}, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005"], 0x7c}}, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x48}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") [ 1666.650260][ T1060] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1666.672525][ T1063] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1666.681430][ T1063] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c", 0x66}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x4c}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x4c}}, 0x0) 03:36:57 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e"], 0x3000}], 0x1}, 0x0) [ 1666.734693][ T1066] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a000000090002007379"], 0x7c}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c", 0x66}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x60}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e"], 0x3000}], 0x1}, 0x0) 03:36:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp\x00') preadv(r0, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/234, 0xea}], 0x1, 0x0, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a000000090002007379"], 0x7c}}, 0x0) 03:36:57 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bd"], 0x3000}], 0x1}, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a000000090002007379"], 0x7c}}, 0x0) 03:36:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c", 0x66}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x68}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001c00)={&(0x7f0000000540)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001a80)=[{&(0x7f0000000580)="3498b63e25f25d68e1e2c306b811fca432dfc3168d7efa67c9156610c9cd8f392b9fbb75f7d49cc4672e20d7fb4945434516186f1ff2680345d4be382809d10c9f3bc77dca1731b0e70e063a9a4d9a8586a3f8f853cd07efd117e2b614eba5075f4df4714015e3d52655d3a7ef90e82355bd37eb903f7b750ebf0efd25399f746b451290b94eb4879f5f03f2c5340195dbe3e78e0eadff9f377a", 0x9a}, {&(0x7f0000000640)="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", 0x6af}, {0x0}], 0x3, &(0x7f0000001b40)=[@cred, @rights, @rights, @rights, @cred, @cred], 0xb8}, 0x0) 03:36:57 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bd"], 0x3000}], 0x1}, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a3200000000"], 0x7c}}, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x2, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x6c}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a3200000000"], 0x7c}}, 0x0) 03:36:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000000)={'bond0\x00', @ifru_ivalue=0x3}) 03:36:57 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="0201130001001f00cb2f436c4a1bbef1000000010000ac141417ef06e63a808a5e5cbd0f7203fbb6fb520f0604e4fdfe068894305ac6658315b70fbe809fe3c06376c33076a167d52261a67ad29b308cde521aa0c385a83fe30c3ac7ec19866e16bd"], 0x3000}], 0x1}, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x74}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x2, 0x0) 03:36:57 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, 0x0, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a3200000000"], 0x7c}}, 0x0) 03:36:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000030211"], 0x44}}, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x400c802, &(0x7f0000000580)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000100)='J', 0xfdbe, 0x4004084, 0x0, 0x11000a00) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x7a}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a3200000000050001"], 0x7c}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x2, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000340)) 03:36:57 executing program 0: syz_clone(0x2902a100, 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a3200000000050001"], 0x7c}}, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0x8f}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a3200000000050001"], 0x7c}}, 0x0) 03:36:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r0) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYRES8, @ANYRESOCT=r1], 0x14}}, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0xfe}, 0x1, 0x413, &(0x7f0000000500)="$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") 03:36:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000580)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000006c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x1c}}, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a320000000005000100"], 0x7c}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x801}, 0x14}}, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0)={[], [], 0xff}, 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a320000000005000100"], 0x7c}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a000000600002"], 0x7c}}, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x0, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000020211"], 0x44}}, 0x0) 03:36:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000900020073797a320000000005000100"], 0x7c}}, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x2, 0x413, &(0x7f0000000500)="$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") 03:36:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000006060108000000000000000000004000050005000a0000000900020073797a3200000000050001"], 0x7c}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:36:57 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x40, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5}]}, 0x40}}, 0x0) 03:36:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000000211"], 0x44}}, 0x0) 03:36:58 executing program 1: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xfffffff2}, 0x2}, 0x0) 03:36:58 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x3, 0x413, &(0x7f0000000500)="$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") 03:36:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x5}]}, 0x1c}}, 0x0) 03:36:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:36:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c0000000a0601"], 0x7c}}, 0x0) 03:36:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x7, 0x6, 0x801}, 0x14}}, 0x0) 03:36:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:58 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c000000100001080000000000000000000040"], 0x7c}}, 0x0) 03:36:58 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4}, 0x2}, 0x0) 03:36:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x4, 0x413, &(0x7f0000000500)="$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") 03:36:58 executing program 1: socketpair(0x2a, 0x2, 0x0, &(0x7f0000000300)) 03:36:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNEL={0x5}]}, 0x1c}}, 0x0) 03:36:58 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000000311"], 0x44}}, 0x0) 03:36:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 03:36:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x5, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x10, 0x6, 0x801}, 0x14}}, 0x0) 03:36:58 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:36:58 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={0x0}}, 0xc0) 03:36:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="18000000030601"], 0x18}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) 03:36:58 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x54}}, 0x0) 03:36:58 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$l2tp6(r0, 0x0, 0x0, 0x12002, 0x0, 0x0) 03:36:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x6, 0x413, &(0x7f0000000500)="$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") 03:36:58 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:36:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000700)={0x30, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_ENABLED={0x5}]}, 0x30}}, 0x0) 03:36:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:58 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={0x0}}, 0x0) 03:36:58 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNEL={0x5}, @IEEE802154_ATTR_COORD_PAN_ID={0x6}]}, 0x24}}, 0x0) 03:36:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x8, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x8}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:36:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x9, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x5}]}, 0x1c}}, 0x0) 03:36:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001040)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)='J', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="08422eb0715f5fbd04c9b76e153d455e8d941ed78f22b6b5b5d69bb4fb2c3d9dcef33eb1a3187dffc835241ee1a71603c4cc4eaebe015dca58551f64b6e0b22ebfd2adaf1c2ede9ee91126e1d0bc62ddd28cc301e5e8d9dc7cac6731c896a0666bd1ec23105c49", 0x67}, {&(0x7f0000000980)="e0db4dd0839d817198bb40b14b821171d5e9e2e085367114ca13bd1837e94d0f36c208859836b123fc10e1f9534e52a95c8a2c1b19b228bd984fdf53dcd602307c30ab5ac1af1572382a256d0adc5a9dde818988ddf7c02ad437e072e78a84e296d32245a8f9400dd27b", 0x6a}], 0x2}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000a80)="03b09c8f67795cc324c0b4abfe3566204d6b507f470e91f90ed3b528f54ceaddbc78e4f5f3f21e1a86b100484143f47b77da0e78247f50ccbed07f93c6ea93d8446960ff9c5dea50b495dd5d3f2340bf5f6fdea2a9ee197d9a5ecad24693fe807761f7887b4db71df05e610da8bd104c57810d706fff91fb130db033aab9ac17d003de768e41161311ed69fb2708cf6968f89e1d1845cdbf06f6f6dd864e00ddee1de49d", 0xa4}, {&(0x7f0000000b40)="237733977f715cbb564d2e00beb19b0779e4b51d64de056493540ca4371cb84aa05b2c196c69c68480f96230c1", 0x2d}], 0x2}}], 0x3, 0x0) 03:36:59 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={0x0}}, 0x0) 03:36:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80b}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:36:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x9, 0x413, &(0x7f0000000500)="$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") 03:36:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80e}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x18, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}]}, 0x18}}, 0x0) 03:36:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="67e2c95c00a91364789801"], 0x14}}, 0x0) 03:36:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000580)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x1c, r2, 0x3d, 0x0, 0x0, {0x23}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x1c}}, 0x0) 03:36:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0xb, 0x413, &(0x7f0000000500)="$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") 03:36:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x4, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x0, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x0, 0x2, 'syz2\x00'}]}, 0x4c}}, 0x0) 03:36:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000bc0)='environ\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fa5413e940000000400000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)="45b46fbe7fdca862f4484ad916fa919c93ce789aa142d489c5c618a242a6a6562e8410232a1a30da2dcca2d0023792d730311c7f6f52fe2c476b50a2cf43dfbf1bd69c74423ec5d003355b58735f7d1e195da755909b013846d77d0ce825bda2a5ba9952e169374b01829b61e5df3494b127b514df0f65cab0aef36090977d88130c5944645a291fc7") ptrace$setregs(0xf, r1, 0x0, &(0x7f00000001c0)="7a9f39e1ae") ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000180)={0x0}) 03:36:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:36:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0xc, 0x413, &(0x7f0000000500)="$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") 03:36:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:36:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0xe, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") [ 1669.123548][ T1357] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:36:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x4c}}, 0x0) 03:36:59 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r2, 0x3d, 0x0, 0x0, {0x24}}, 0x14}}, 0x0) 03:36:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r2, 0x3d, 0x0, 0x0, {0x2e}}, 0x14}}, 0x0) 03:36:59 executing program 1: sendto$l2tp6(0xffffffffffffffff, &(0x7f0000000080)="6fee376337", 0x5, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'sed\x00'}, 0x2c) 03:36:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x6}]}, 0x1c}}, 0x0) 03:36:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0xf, 0x413, &(0x7f0000000500)="$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") 03:36:59 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) recvfrom$l2tp6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r2, 0xd1d, 0x0, 0x0, {0x22}}, 0x14}}, 0x0) 03:36:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x2}}}}}}}, 0x0) 03:36:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2, 0xc, 0x801}, 0x14}}, 0x0) 03:36:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x7}]}, 0x1c}}, 0x0) 03:36:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x3}}}}}}}, 0x0) 03:36:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x10, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:36:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r2, 0x3d, 0x0, 0x0, {0x2b}}, 0x14}}, 0x0) [ 1669.296706][ T1379] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1669.320107][ T1379] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:36:59 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) recvfrom$l2tp6(r1, 0x0, 0x0, 0x12002, 0x0, 0x0) 03:36:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x20, r2, 0xd1d, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x20}}, 0x0) 03:36:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}, 0x0) 03:36:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x11, 0x413, &(0x7f0000000500)="$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") 03:37:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r2, 0x3d, 0x0, 0x0, {0x27}}, 0x14}}, 0x0) 03:37:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x48}}, 0x0) 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x25, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:37:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x20, r2, 0xd1d, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x20}}, 0x0) 03:37:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000000)={'macvtap0\x00', @ifru_addrs=@l2={0x1f, 0x0, @none}}) 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 1670.213220][ T1416] __do_sys_memfd_create: 35 callbacks suppressed [ 1670.213237][ T1416] syz-executor.4[1416]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="0100d7fd8d9064487af367"], 0x14}}, 0x0) 03:37:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x48, 0x413, &(0x7f0000000500)="$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") 03:37:00 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$l2tp6(r1, &(0x7f0000000340)="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", 0x1000, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x3}}}}}}}, 0x0) 03:37:00 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000000000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) shmctl$IPC_RMID(r0, 0x0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000000000/0x4000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 03:37:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 03:37:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNEL={0x5}, @IEEE802154_ATTR_CAPABILITY={0x5}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_COORD_PAN_ID={0x6}]}, 0x38}}, 0x0) 03:37:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r2, 0xd1d, 0x0, 0x0, {0x32}}, 0x14}}, 0x0) 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x4}}}}}}}, 0x0) 03:37:00 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001740)={&(0x7f0000000100), 0xc, &(0x7f0000001700)={&(0x7f0000001440)={0x14}, 0x14}}, 0x0) 03:37:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000002060108000000000000000000004000050007"], 0x7c}}, 0x0) [ 1670.361089][ T1433] syz-executor.4[1433]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0xfe, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:37:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:00 executing program 0: pipe2$watch_queue(0x0, 0x80) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000100)={0x10}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x5}}}}}}}, 0x0) 03:37:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) [ 1670.476760][ T1451] syz-executor.4[1451]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x6}}}}}}}, 0x0) 03:37:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2}]}, 0x1c}}, 0x0) 03:37:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x40f, &(0x7f0000000500)="$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") 03:37:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) 03:37:00 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x2}, 0x0) 03:37:00 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:00 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x4}}}}}}}, 0x0) [ 1670.618464][ T1479] syz-executor.4[1479]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:00 executing program 0: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/4\x00') fcntl$lock(r2, 0x6, &(0x7f0000000080)) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffdc}, 0x0) 03:37:00 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x412, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//6JK3H4=") 03:37:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:00 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x44}}}}}}}, 0x0) 03:37:00 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:00 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:00 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) [ 1670.749074][ T1502] syz-executor.4[1502]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:00 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:00 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x414, &(0x7f0000000500)="$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") 03:37:01 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:01 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:01 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:01 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x2}}}}}}}, 0x0) 03:37:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000000706010100000000000000000000002005008400fe0000000500010007"], 0x24}}, 0x0) 03:37:01 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:01 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3}}}}}}}, 0x0) 03:37:01 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:01 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000007060108000000000000000000004000050005000a0000000900020073797a3200000000050001"], 0x7c}}, 0x0) 03:37:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x4fe, &(0x7f0000000500)="$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") [ 1671.120514][ T1529] syz-executor.4[1529]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:01 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:01 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4}}}}}}}, 0x0) 03:37:01 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") [ 1671.194870][ T1541] syz-executor.4[1541]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1671.207008][ T1542] __nla_validate_parse: 20 callbacks suppressed [ 1671.207060][ T1542] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 03:37:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x6, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:01 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x5}}}}}}}, 0x0) 03:37:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:01 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x5, 0x6, 0x801}, 0x14}}, 0x0) 03:37:01 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x6}}}}}}}, 0x0) 03:37:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:01 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) [ 1671.317704][ T1556] syz-executor.4[1556]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:01 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x7}}}}}}}, 0x0) 03:37:01 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) 03:37:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:01 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8}}}}}}}, 0x0) 03:37:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) [ 1671.439907][ T1579] syz-executor.4[1579]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:01 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xb}}}}}}}, 0x0) 03:37:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M9vFVUcB9DPvLYQAS0YUcRfFVSKaGtbEzTBRKKsZGMwcd20hRALNbQmQojRxIU7NyauXbFzycKVK1xqon+AujJEYojEndbMe/PoA/oKhdZnOuck0947d17vnbn5zry5vbkBaqtR/iiSbUl+SjLYyi4Zam3lr2tXz0/9dfX8VJHFxWN/FM3j/rx6fqp9aPtzW6s/PNxIGp8WeWyZeufPnntvcnZ25kyVH1049f7o/NlzL548NXli5sTM6bGDr74yMXZwfGJizc71rQsfHdv69utHPp/+8fe5C798U7Z3W1XWeR5rZShDN17LDs+tdWU9trMjXfT3sCGsSl+SsrsGmvE/mL4sdd5gvvu5p40D1tViaXPX4o8XgQ2sSK9bAPRG+0Ffvv+2t//quwe9d+Vw6wWw7Pdr1dYq6W+NDVXvhjvXqf6hJIcuHvm63LJO4zAAAAAAdfbt4SQvLDf+18jDHceV6UeS7EryaJLdSXNez+NJnkjyZJKnqvGc1bj5+FvHfxqX7+rEuCNXDieHqrldN47/tUf/sr2vyt1fZjJQHD85O/NSkgeSDGdgc5kfW6GOS9//80O3ss7xv3Ir62+PBVbtuNx/0/+npycXJu/lnFly5ZNkd/9y/V9cnwlUJHk6yZ67rOPXPftPdCu7ff+znha/SvYtG/9LMxeLlednjjbvB6Ptu8KtPhsbf7Nb/fq/t8r437Jy/28vOufrzq++jku7Lr7Wrexu7/+bineaDdxU7ftwcmHhzFiyqTh66/7x1bd5o2pfj/b1Kvt/eO/yz/8Hq8+UF3RvkmeSPFvNXd7XfPYn+5M8n+TACnX+/cbBd7uVif/eKvt/elXxv/rEoR1fHu1W/53F/8vNxgxXe3z/u7077aBetxMAAAAAAACAtdForoFXNEaupxuNkZHWGn4PZUtjdm5+4cDxuQ9OT7fWytuegUZ7ptdgx3zQsWZ6KT9+U34iyY4kX/Td18yPTM3NTvf65KHmtnaJ/9Jvfb1uHbDurNcK9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q/1Jf6hlu5lXT8JCYmNmuj1nQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg/+HfAAAA//8TUdxg") 03:37:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) [ 1671.595386][ T1602] syz-executor.4[1602]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000003060108000000000000000000004000050005000a0000000900020073797a3200000000050001"], 0x7c}}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x10}}}}}}}, 0x0) 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x30, 0x3, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0xfffc}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}}, 0x4000844) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'gre0\x00', &(0x7f00000002c0)={'syztnl2\x00', 0x0, 0x10, 0x10, 0xef6, 0x3, {{0x22, 0x4, 0x1, 0x2d, 0x88, 0x65, 0x0, 0xb0, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x32}, {[@cipso={0x86, 0x39, 0x3, [{0x6, 0xe, "b9cc63dcd25d4afbe1c198b3"}, {0x0, 0xd, "1c11294e5b4b9abfa9f20e"}, {0x6, 0x4, "b23d"}, {0x5, 0x10, "799ce6634f81c993c110beb4e79a"}, {0x3, 0x2}, {0x1, 0x2}]}, @timestamp={0x44, 0x8, 0xb8, 0x0, 0x6, [0x0]}, @timestamp_prespec={0x44, 0x2c, 0xf8, 0x3, 0x2, [{@empty}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x3}, {@multicast1, 0x6bd}, {@broadcast, 0x7}, {@private=0xa010101, 0xfffffe00}]}, @rr={0x7, 0x7, 0x2d, [@initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x2f}}}}}}}, 0x0) [ 1672.377539][ T1614] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 03:37:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3c}}}}}}}, 0x0) 03:37:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x289}}}}}}}, 0x0) 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x40}}, 0x0) 03:37:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x300}}}}}}}, 0x0) 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x40}}, 0x0) 03:37:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 03:37:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3e8}}}}}}}, 0x0) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}]}, 0x1c}}, 0x0) 03:37:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x40}}, 0x0) 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x500}}}}}}}, 0x0) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}]}, 0x1c}}, 0x0) 03:37:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x38, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}}, 0x0) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}]}, 0x1c}}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x543}}}}}}}, 0x0) 03:37:02 executing program 0: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x38, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}}, 0x0) 03:37:02 executing program 0: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x600}}}}}}}, 0x0) 03:37:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3MtvFVUcB/Dv3LYQeVgwPhBfFVSKaGtbEzTBRKKsZGMwcd20hRALNbQmQojRxIU7NyauXbFzycKVK1xqon+AujJEYojEndbM7b30UnoLF1rHMJ9PMrfnzJmbc2ZOfjN3Tk9OgNraXn4UybYkPyUZXMouG1rayj/Xrp6f+uvq+akii4vH/iiax/159fxU+9D297aWH41kuJE0Pi3y2Cr1zp89997k7OzMmVZ+dOHU+6PzZ8+9ePLU5ImZEzOnxw6++srE2MHxiYl1O9e3Lnx0bOvbrx/5fPrH3+cu/PJN2d5trbLO81gvQxm68Vp2eG69K6vYQx3por/ChtCTviRldw00438wfVnuvMF893OljQM21GJpc9fijxeBe1iRqlsAVKP9oC/ff9vbf/Xbg+pdObz0Alj2+7XWtlTSn0brmIEV7/fraSjJoYtHvi63bNA4DAAAAECdfXs4yQurjf818nDHcWX6kSS7kjyaZHfSnNfzeJInkjyZ5KnWeE4vVh5/8/hP4/IdnRi35crh5FBrbteN43/t0b/s6GvltpeZDBTHT87OvJTk/iTDGdhc5sfWqOPS9//80K2sc/yv3Mr622OBrXZc7l/x/+npyYXJuzlnll35JNndv1r/F9dnAhVJnk6y5w7r+HXP/hPdym7d/2ykxa+SfavG//LMxWLt+ZmjzfvBaPuucLPPxsbf7Fa//q9WGf9b1u7/HUXnfN353uu4tOvia93K7vT+v6l4p9nATa19H04uLJwZSzYVR2/eP957m+9V7evRvl5l/w/vXf35/0DrO+UF3ZvkmSTPtuYu72s++5P9SZ5PcmCNOv9+4+C73crEf7XK/p/uKf57Txza+eXRbvXfXvy/3GzMcGuP33+3drsdVHU7AQAAAAAAAFgfjeYaeEVj5Hq60RgZWVrD78FsaczOzS8cOD73wenppbXydmSg0Z7pNdgxH3SsmV7Oj6/ITyTZmeSLvvua+ZGpudnpqk8eam5rl/gv/dZXdeuADWe9Vqgv8Q/1Jf6hvsQ/1Jf4h/oS/1Bf4h/qS/xDfYl/qC/xD7V0N+v6SUhI3KuJqu9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP8P/wYAAP//6dbcaw==") 03:37:02 executing program 0: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x38, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}}, 0x0) 03:37:02 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x608}}}}}}}, 0x0) 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x3c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x20, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}}, 0x0) 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x3c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}}, 0x0) 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x20, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x689}}}}}}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x3c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}}, 0x0) 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x20, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}}, 0x0) 03:37:03 executing program 1: socketpair(0xa, 0x2, 0x0, &(0x7f0000000300)) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x700}}}}}}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x806}}}}}}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x810}}}}}}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x3, 0x6, 0x801}, 0x14}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xb00}}}}}}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:03 executing program 2: socketpair(0x2, 0x2, 0x0, &(0x7f0000000300)) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xe80}}}}}}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x1008}}}}}}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, 0x0, 0x0) 03:37:03 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x20, r2, 0xd1d, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x38, 'wpan3\x00'}]}, 0x20}}, 0x0) 03:37:03 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3E1vFVUcB+Df3LYQAS0YXxDfKqgU0da2JmiCUaKsZGMwcd20hRALNbQmQojRxIU7NyauXbFzycKVK1xqoh9AXRkiMUTiTmvm9l56Kb2FC61jmOdJ5vacOXNzzszJf+bO6ckJUFuvlR9Fsi3JT0kGl7LLhpa28s/VK+em/rpybqrI4uLRP4rmcX9eOTfVPrT9va3lRyMZbiSNT4s8ukq982fOvjc5OztzupUfXTj5/uj8mbMvnDg5eXzm+MypsQOvvDwxdmB8YmLdzvWt8x8d3fr264c/n/7x97nzv3xTtndbq6zzPNbLUIauv5Ydnl3vyir2YEe66K+wIfSkL0nZXQPN+B9MX5Y7bzDf/Vxp44ANtVja3LX440XgLlak6hYA1Wg/6Mv33/b2X/32oHqXDy29AJb9frW1LZX0p9E6ZmDF+/16Gkpy8MLhr8stGzQOAwAAAFBn3x5K8vxq43+NPNRxXJl+OMnOJI8k2ZU05/U8luTxJE8kebI1ntOLlcffOP7TuHRbJ8YtuXwoOdia23X9+F979C/b+1q5e8tMBopjJ2ZnXkxyX5LhDGwu82Nr1HHx+39+6FbWOf5XbmX97bHAVjsu9a/4//T05MLknZwzyy5/kuzqX63/i2szgYokTyXZfZt1/Lp73/FuZTfvfzbS4lfJ3lXjf3nmYrH2/MzR5v1gtH1XuNFnY+Nvdqtf/1erjP8ta/f/9qJzvu5873Vc3Hnh1W5lt3v/31S802zgpta+DycXFk6PJZuKIzfuH++9zXer9vVoX6+y/4f3rP78v7/1nfKC7knydJJnWnOX9zaf/cm+JM8l2b9GnX+/ceDdbmXiv1pl/0/3FP+9Jw7u+PJIt/pvLf5fajZmuLXH77+bu9UOqrqdAAAAAAAAAKyPRnMNvKIxci3daIyMLK3h90C2NGbn5hf2H5v74NT00lp52zPQaM/0GuyYDzrWTC/nx1fkJ5LsSPJF3z3N/MjU3Ox01ScPNbe1S/yXfuurunXAhrNeK9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q/1Jf6hvsQ/1Jf4h1q6k3X9JCQk7tZE1XcmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgP+HfwMAAP//LY7cnQ==") 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x2000}}}}}}}, 0x0) 03:37:03 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, 0x0, 0x0) 03:37:03 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x2f00}}}}}}}, 0x0) 03:37:03 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r2, 0xd1d, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 03:37:03 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x2f89}}}}}}}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000004060108000000000000000000004000050005000a0000000d00020073797a320000000005"], 0x7c}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, 0x0, 0x0) 03:37:03 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000010000108000000000000000000004000050005000a0000000900020073797a3200000000050001"], 0x7c}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3580}}}}}}}, 0x0) 03:37:03 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000020311"], 0x44}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3c00}}}}}}}, 0x0) 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) [ 1673.706184][ T1863] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1673.709523][ T1865] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4305}}}}}}}, 0x0) 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x9, 0x6, 0x801}, 0x14}}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x9, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 1673.765007][ T1875] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4788}}}}}}}, 0x0) 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000001021181"], 0x44}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4888}}}}}}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000000302116f"], 0x44}}, 0x0) 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x6488}}}}}}}, 0x0) 03:37:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0xf, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}]}, 0x18}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x800e}}}}}}}, 0x0) 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 1673.899609][ T1899] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1673.929954][ T1906] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c0000000b0601"], 0x7c}}, 0x0) 03:37:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 03:37:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:37:03 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8035}}}}}}}, 0x0) 03:37:03 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 03:37:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 03:37:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:04 executing program 2: socketpair(0x29, 0x2, 0x0, &(0x7f0000000300)) [ 1674.022336][ T1919] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 03:37:04 executing program 3: socketpair(0x23, 0x2, 0x0, &(0x7f0000000300)) 03:37:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 03:37:04 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8100}}}}}}}, 0x0) 03:37:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x5}]}, 0x1c}}, 0x0) 03:37:04 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4}, 0x2}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) 03:37:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 03:37:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:04 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8847}}}}}}}, 0x0) 03:37:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3E1vFVUcB+Df3LYQAS0YXxDfKqgU0da2JmiCiURZycZg4rppCyEWamhNhBCjiQt3bkxcu2LnkoUrV7jURD+AujJEokTiTmvm9l56Kb2lhdYxnedJ5vacOefmnJmT/8yd05MJUFsDzc8/siPJj0n6kxRLKwws/Ll+7cLEX9cuTBSZnz/+e9Gs9+e1CxPtqu3vbS8/GslgI2l8UuTRZdqdPXf+3fHp6amzrfzw3On3hmfPnX/h1Onxk1Mnp86MHHrl5bGRQ6NjY+t2rG9e/PD49rdeO/rZ5A+/zVz8+euyvztaZZ3HsV4GMnDzuezw7Ho3VrEHO9JFb4UdYU16kpTD1deM//70ZHHw+vPtT5V2DthQ86WtXYs/mgc2sSJV9wCoRvtGXz7/trf/6rcH1bt6ZOEBsBz3661toaQ3jVadviXP9+tpIMnhS0e/Krds0DwMAAAAQJ19cyTJ88vN/zXyUEe9Mv1wkt1JHkmyJ2mu63ksyeNJnkjy5I31RKu3tP6t8z+NK3d0YKzK1SPJ4dbarpvn/9qzf9nZ08rdW2bSV5w4NT31YpL7kgymb2uZH1mhjcvf/fN9t7LO+b9yK9tvzwW2+nGld8n/pyfH58bv5phZdPXjZE/vcuNf3FgJVCR5KsneO2zjl70HTnYru/34s5Hmv0z2Lxv/iysXi5XXZw43rwfD7avCrT4dGX2jW/vGv1pl/G9befx3Fp3rdWfX3sbl3Zde7VZ2p9f/LcXbzQ5uae37YHxu7uxIsqU4duv+0bX3ebNqn4/2+SrHf3Df8vf/+1vfKU/oviRPJ3mmtXZ5f/PenxxI8lySgyu0+ffrh97pVib+q1WO/+Sa4n/ticO7vjjWrf3Vxf9Lzc4Mtvb4/Xd7qx2gqvsJAAAAAAAAwPpoNN+BVzSGbqQbjaGhhXf4PZBtjemZ2bmDJ2bePzO58K68nelrtFd69XesBx1pphfzo0vyY0l2Jfm8555mfmhiZnqy6oOHmtveJf5Lv/ZU3Ttgw3lfK9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q/1Jf6hvsQ/1Jf4h1q6m/f6SUhIbNZE1VcmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgP+HfwMAAP//GIbdbQ==") 03:37:04 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 03:37:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:04 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8848}}}}}}}, 0x0) 03:37:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c0000000b060108000000000000000000004000050005000a0000000900020073797a3200000000050001"], 0x7c}}, 0x0) [ 1674.276911][ T1971] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 03:37:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r2, 0x3d, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 03:37:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000010211"], 0x44}}, 0x0) 03:37:04 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8864}}}}}}}, 0x0) 03:37:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:04 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8902}}}}}}}, 0x0) 03:37:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 03:37:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x4, 0x6, 0x801}, 0x14}}, 0x0) 03:37:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000000411"], 0x44}}, 0x0) 03:37:05 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={0x0}}, 0x0) [ 1675.075936][ T1978] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 03:37:05 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8906}}}}}}}, 0x0) 03:37:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}]}, 0x1c}}, 0x0) 03:37:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x4, 0x6, 0x801}, 0x14}}, 0x0) 03:37:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x38, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x0, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x0, 0x2, 'syz2\x00'}]}, 0x4c}}, 0x0) 03:37:05 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x892f}}}}}}}, 0x0) 03:37:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x20, r2, 0xd1d, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0x3, 0x1, 'wpan3\x00'}]}, 0x20}}, 0x0) [ 1675.155255][ T1993] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 03:37:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}]}, 0x1c}}, 0x0) 03:37:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x4, 0x6, 0x801}, 0x14}}, 0x0) 03:37:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000010411"], 0x44}}, 0x0) 03:37:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M9vFVUfB+DPTFvIC68WjCjirwoqRbS1rQmaYCJRVrIxmLhu2kKIhRpaEyHEaOLCnRsT167YuWThyhUuNdE/QF0ZIjFE4k5r5vZeeoHeQqF1DPM8ydyeM2duzpk5+c7cOT05ARprqPookjLJj0kGl7LXHzC09OfqlXNTf145N1VkcfHo70XruD+unJvqHNr53tbqo0yGy6T8pMijK9Q7f+bsu5OzszOn2/nRhZPvjc6fOfvCiZOTx2eOz5waO/DKyxNjB8YnJtbtXN88/+HRrW+9dviz6R9+mzv/89dVe//fLus+j/UylKHrr2WXZ9e7sprt6EoX/TU2hDXpS1J110Ar/gfTl+XOG8y3P9XaOGBDLVY29yz+aBG4hxWpuwVAPToP+ur9t7P9W789qN/lQ0svgFW/X21vSyX9rTGhtN8Nd2xQ/UNJDl44/FW1ZYPGYQAAAACa7JtDSZ5fafyvzENdx1Xph5PsTPJIkl1Ja17PY0keT/JEkic784nW4Mbjbx7/KS/d0YlxWy4fSg6253ZdP/7XGf3Ltr527r4qk4Hi2InZmReT3J9kOAObq/zYKnVc/O7v73uVdY//VVtVf2cssN2OS/03/H96enJh8m7OmWWXP0529a/U/8W1mUBFkqeS7L7DOn7Zve94r7Jb9z8bafHLZO+K8b88c7FYfX7maOt+MNq5K9zs07HxN3rVr//rVcX/ltX7f1vRPV93fu11XNx54dVeZXd6/99UvN1q4Kb2vg8mFxZOjyWbiiM37x9fe5vvVZ3r0bleVf8P71n5+f9A+zvVBd2T5Okkz7TnLu9tPfuTfUmeS7J/lTr/ev3AO73KxH+9qv6fXlP8rz1xcPsXR3rVf3vx/1KrMcPtPX7/3drtdlDd7QQAAAAAAABgfZStNfCKcuRauixHRpbW8HswW8rZufmF/cfm3j81vbRW3rYMlJ2ZXoNd80HHWunl/PgN+Ykk25N83ve/Vn5kam52uu6Th4bb2iP+K7/21d06YMNZrxWaS/xDc4l/aC7xD80l/qG5xD80l/iH5hL/0FziH5pL/EMj3c26fhISEvdqou47EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMB/wz8BAAD//8hC3HQ=") 03:37:05 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xe803}}}}}}}, 0x0) 03:37:05 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) recvfrom$l2tp6(r1, 0x0, 0x0, 0x12002, &(0x7f0000000240)={0xa, 0x0, 0x0, @private0}, 0x20) 03:37:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x20, r2, 0xd1d, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x2, 'wpan3\x00'}]}, 0x20}}, 0x0) 03:37:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}]}, 0x1c}}, 0x0) 03:37:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r2, 0x3d}, 0x14}}, 0x0) 03:37:05 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x20000}}}}}}}, 0x0) 03:37:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x18, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4, 0x5}]}, 0x18}}, 0x0) 03:37:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNELS={0x8}]}, 0x1c}}, 0x0) 03:37:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0xb, 0x6, 0x101}, 0x14}}, 0x0) [ 1675.308638][ T2023] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 03:37:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNELS={0x8}]}, 0x1c}}, 0x0) 03:37:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="7c00000005060108000000000000000000004000050005000a0000000900020073797a3200000000050001"], 0x7c}}, 0x0) 03:37:05 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x1000000}}}}}}}, 0x0) [ 1675.374907][ T2035] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 03:37:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x62, 0x6a, 0xa, 0xff00}, [@call={0x5f}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNELS={0x8}]}, 0x1c}}, 0x0) 03:37:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$evdev(r0, &(0x7f0000000440)=[{}], 0xfffffffffffffdef) 03:37:05 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x2000000}}}}}}}, 0x0) 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3000000}}}}}}}, 0x0) 03:37:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x3, 0x18}, 0xc) 03:37:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8e}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 03:37:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x5, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x5}]}, 0x1c}}, 0x0) [ 1676.203764][ T2054] __do_sys_memfd_create: 27 callbacks suppressed [ 1676.203784][ T2054] syz-executor.4[2054]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:06 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={0x0, 0xc03e}}, 0x0) 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x4000000}}}}}}}, 0x0) 03:37:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x9e03, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}, [@ldst={0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 03:37:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x5000000}}}}}}}, 0x0) 03:37:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x51, 0x6a, 0xa, 0xff00}, [@call={0x5f}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) [ 1676.297398][ T2071] syz-executor.4[2071]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:06 executing program 1: syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x6000000}}}}}}}, 0x0) 03:37:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0x6a, 0xa, 0xff00}, [@call={0x5f}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x9e03, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 03:37:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x0, 0x0, &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_exit\x00'}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x11, 0x1}, 0x14) 03:37:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x14, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x0, 0x0, 0x3}, @exit={0x95, 0x0, 0x7b00}, @call={0x85, 0x0, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x92, &(0x7f0000000240)=""/146, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:37:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x7000000}}}}}}}, 0x0) [ 1676.426094][ T2093] syz-executor.4[2093]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:06 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8000000}}}}}}}, 0x0) 03:37:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffecc50000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 03:37:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x6c, 0x61, 0x10, 0x4c}, [@ldst={0x6, 0x3, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 03:37:06 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8060000}}}}}}}, 0x0) 03:37:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x63, 0x6a, 0xa, 0xff00}, [@call={0x5f}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:06 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x3, &(0x7f0000000640)=@framed, &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) syz_clone(0x2c12b000, &(0x7f0000000140)="f6e15f86fb3c58cb044fc493f6429fe7f5f1193b1af9ca51d65e82a1c95d673ae11830fd637a9f7d2cef28f5960a550a22e9c11fc51ae179b7fb", 0x3a, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8100000}}}}}}}, 0x0) [ 1676.554105][ T2114] syz-executor.4[2114]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) 03:37:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='xprtrdma_fixup\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x25, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x5, 0x9}, 0x8000, 0x10001, 0xb1, 0x2, 0x80000000, 0x3f, 0x4, 0x0, 0x4, 0x0, 0x8000000000000002}, 0x0, 0x0, r1, 0x9) socketpair(0x0, 0x1, 0x0, &(0x7f00000004c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="981340000100010057850e0059646490563d0f6400000035645632bb89514d2308acc5e8812100"], 0x0, 0x200, 0x9, &(0x7f0000000980)=""/9, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000a00)={0x0, 0x3, 0xff, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_queued\x00', 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="9813c8c7a640000100010057850e0008000000"], 0x0, 0x200, 0x9, &(0x7f0000000980)=""/9, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000a00)={0x0, 0x3, 0xff, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r3]}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='gpio_direction\x00', r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xb000000}}}}}}}, 0x0) 03:37:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") [ 1676.702024][ T2137] syz-executor.4[2137]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1676.738755][ T2132] wg1 speed is unknown, defaulting to 1000 03:37:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x10, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x0, 0x0, 0x3}, @exit={0x95, 0x0, 0x7b00}, @call={0x85, 0x0, 0x0, 0x47}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x92, &(0x7f0000000240)=""/146, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:37:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x10000000}}}}}}}, 0x0) 03:37:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LYQ4HksGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJJtSX5MMriUvbnC0NKf69cuTP157cJUkcXF478XzXp/XLsw1a7a/t6O8qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj+9467Wjn03/8NvcxZ+/Lvv7v1ZZ53Gsl6EM3XwuOzy73o1V7MGOdNFfYUfoSV+ScrgGmvE/mL4sD95gvv2p0s4BG2qxtLVr8UeLwCZWpOoeANVo3+jL59/29m/99qB6V48sPQCW4369tS2V9KfRqjOw4vl+PQ0lOXzp6Ffllg2ahwEAAACos2+OJHl+tfm/Rh7qqFemH06yO8kjSfYkzXU9jyV5PMkTSZ5sryfqwcr6t87/NK7c1YFxR64eSQ631nbdPP/Xnv3Lzr5W7v9lJgPFiVOzMy8muS/JcAa2lvmxNdq4/N3f33cr65z/K7ey/fZcYKsfV/pX/H96enJh8l6OmWVXP0729K82/sWNlUBFkqeS7L3LNn7Ze+Bkt7Lbjz8bafHLZP+q8b+8crFYe33maPN6MNq+Ktzq07HxN7q1b/yrVcb/9rXHf2fRuV53vvc2Lu++9Gq3sru9/m8p3m52cEtr3weTCwtnx5ItxbFb94/33ufNqn0+2uerHP/hfavf/+9vfac8ofuSPJ3kmdba5f3Ne39yIMlzSQ6u0eZfrx96p1uZ+K9WOf7TPcV/74nDu7441q39O4v/l5qdGW7t8fvv9u50gKruJwAAAAAAAADro9F8B17RGLmRbjRGRpbe4fdAtjdm5+YXDp6Ye//M9NK78nZmoNFe6TXYsR50rJlezo+vyE8k2ZXk875tzfzI1NzsdNUHDzW3o0v8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//62u3Hs=") 03:37:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 1676.842642][ T2130] wg1 speed is unknown, defaulting to 1000 [ 1676.875259][ T2143] syz-executor.4[2143]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:06 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x20000000}}}}}}}, 0x0) 03:37:06 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0xff, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000070000006a0200ff000000005f0000000000000095000000000000003199241bcdc907c08a2572aef85afda4b7ce7e33ba21693cff9009b30feccf8d997e673f346d2424ef6b8877205b35c7dae8abccb0aed74bbe16f31a68435e7449a5b0a8b73a3632e13eed71cd8823ec495e001d23521bcb5071ef09cad7165e4234e6243f479f127db32dc7b54cc409cfdce4e6fc010ecebc50c26cadf9e4e7a644b07fbf09c7e0258921b3a0f83d3490fe52b504ae4fee0dd0d873a32ddefa8944960f94b791565caaca2c2e5e2f023c2caff4546d"], &(0x7f0000000140)='GPL\x00', 0x2, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) [ 1676.986986][ T2154] syz-executor.4[2154]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:07 executing program 0: perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8800000, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x2f000000}}}}}}}, 0x0) 03:37:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000010c0)) 03:37:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x10}}], 0x10}, 0x0) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x3c000000}}}}}}}, 0x0) 03:37:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x6a, 0x2, 0xff00}, [@call={0x5f, 0xa}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) [ 1677.311392][ T2165] syz-executor.4[2165]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 03:37:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:07 executing program 3: syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x5, 0x67, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) [ 1677.432073][ T2181] syz-executor.4[2181]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1677.465029][ T2184] wg1 speed is unknown, defaulting to 1000 03:37:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x10, 0x6a, 0xa, 0xff00}, [@call={0x5f}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x40000000}}}}}}}, 0x0) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:07 executing program 1: syz_clone(0x8800000, &(0x7f0000000340), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="9041080b6d34a0e0653a59810c188c5e5c13210852409191206f2705a7cbced065ad094da4f280de25518b9406f8fb65112be351c6a725d0a08d93965b5ae36d99781b5b3b61c78c2fc39b5a") 03:37:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:07 executing program 1: perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x43050000}}}}}}}, 0x0) [ 1677.527382][ T2189] syz-executor.4[2189]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:37:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x800e0000}}}}}}}, 0x0) 03:37:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x0, 0x3, &(0x7f0000000640)=@framed, &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_exit\x00'}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f00000003c0), 0xc) 03:37:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQBx4tGF8Q3yqoFNHWtiZoglGirGRjMHHdtIUQCzW0JkKI0cSFOzcmrl2xc8nClStcaqJ/gLoyRGKIxJ3WzO299FJ6Cxdax3Q+n2Ruz5lzbs6ZOfnN3Dk9mQC1NVR+FMmrSX5MMriUvbHC0NKfa1fPT/159fxUkcXFY78XzXp/XD0/1a7a/t728qORDDeSxidFHlml3fmz596dnJ2dOdPKjy6cem90/uy550+emjwxc2Lm9NjBl1+aGDs4PjGxbsf65oUPj21/67Ujn03/8NvchZ+/Lvv7/1ZZ53Gsl6EM3XguOzyz3o1V7IGOdNFfYUfoSV+ScrgGmvE/mL4sD95gvv2p0s4BG2qxtLVr8UeLwCZWpOoeANVo3+jL59/29m/99qB6Vw4vPQCW436ttS2V9KfRqjOw4vl+PQ0lOXTxyFfllg2ahwEAAACos28OJ3lutfm/Rh7sqFemH0qyK8nDSXYnzXU9jyZ5LMnjSZ5oryfqwcr6N8//NC7f0YFxW64cTg611nbdOP/Xnv3Ljr5W7p4yk4Hi+MnZmReS3JtkOANby/zYGm1c+u7v77uVdc7/lVvZfnsusNWPy/0r/j89PbkweTfHzLIrHye7+1cb/+L6SqAiyZNJ9txhG7/s2X+iW9mtx5+NtPhlsm/V+F9euVisvT5ztHk9GG1fFW726dj4G93aN/7VKuN/29rjv6PoXK8733sbl3ZdfKVb2Z1e/7cUbzc7uKW174PJhYUzY8mW4ujN+8d77/Nm1T4f7fNVjv/w3tXv//e1vlOe0L1JnkrydGvt8r7mvT/Zn+TZJAfWaPOv1w++061M/FerHP/pnuK/98ShnV8c7db+7cX/i83ODLf2+P13a7c7QFX3EwAAAAAAAID10Wi+A69ojFxPNxojI0vv8Ls/2xqzc/MLB47PvX96euldeTsy0Giv9BrsWA861kwv58dX5CeS7Ezyed//mvmRqbnZ6aoPHmpue5f4L/3aV3XvgA3nfa1QX+If6kv8Q32Jf6gv8Q/1Jf6hvsQ/1Jf4h/oS/1Bf4h9q6W7e6ychIbFZE1VfmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD+G/4JAAD//+CX3LE=") 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x80350000}}}}}}}, 0x0) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000001480)) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000070000006a0200ff000000005f0000000000000095000000000000003199241bcdc907c08a2572aef85afda4b7ce7e33ba21693cff9009b30feccf8d997e673f346d2424ef6b8877205b35c7dae8abccb0aed74bbe16f31a68435e7449a5b0a8b73a3632e13eed71cd8823ec495e001d23521bcb5071ef09cad7165e4234e6243f479f127db32dc7b54cc409cfdce4e6fc010ecebc50c26cadf9e4e7a644b07fbf09c7e0258921b3a0f83d3490fe52b504ae4fee0dd0d873a32ddefa8944960f94b791565caaca2c2e5e2f023c2caff4546d"], &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x81000000}}}}}}}, 0x0) 03:37:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8e}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x86ddffff}}}}}}}, 0x0) 03:37:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0x23, 0x0, 0x0) 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x88470000}}}}}}}, 0x0) [ 1677.959442][ T2224] tun0: tun_chr_ioctl cmd 1074025698 03:37:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000001480)) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x17, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6a, 0x6a, 0xa, 0xff00}, [@call={0x5f}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x88480000}}}}}}}, 0x0) 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x88640000}}}}}}}, 0x0) 03:37:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x17, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x51, 0x6a, 0xa, 0xff00}, [@call={0x5f}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:37:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:07 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x88a8ffff}}}}}}}, 0x0) 03:37:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x7, 0x6, 0xff}, 0x14}}, 0x0) 03:37:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000001480)) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x88caffff}}}}}}}, 0x0) 03:37:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x6a, 0xa, 0xff00}, [@call={0x5f, 0x10}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3E1vFVUcB+Df3LYQAQWMKOJbBZUi2trWBE0wkSgr2RhMXDdtIcRCDa2JEGI0ceHOjYlrV+xcsnDlCpea6AdQV4ZIDJG405q5L/QCvYULrWOY50mmPWfO3J4zc/KfuXN6cgLU1nD5o0i2JPkpSaOVvf6A4davq1fOTf915dx0kaWlo38UzeP+vHJuunNo53Ob0/pDI42k8WmRx1aod+HM2fem5uZmT7fzY4sn3x9bOHP2xRMnp47PHp89NX7g1Vcmxw9MTE6u2bm+df6jo5vffv3w5zM//j5//pdvyvZuaZd1n8daGc7w9deyy3NrXVnFdnSli8EKG0JfBpKU3TXUjP+tGchy523Ndz9X2jhgXS2VNvYs/ngJuIcVqboFQDU6D/ry/bez/VffPaje5UOtF8Cy36+2t1bJYHMsKO13wx3rVP9wkoMXDn9dblmncRgAAACAOvv2UJIXVhr/a+ThruPK9CNJdiZ5NMmupDmv5/EkTyR5MslTnflEfbjx+JvHfxqX7ujEuC2XDyUH23O7rh//64z+ZdtAO3d/mclQcezE3OxLSR5IMpKhjWV+fJU6Ln7/zw+9yrrH/8qtrL8zFthux6XBG/4/PTO1OHU358yyy58kuwZX6v/i2kygIsnTSXbfYR2/7t53vFfZrfuf9bT0VbJ3xfhfnrlYrD4/c6x5Pxjr3BVu9tn4xJu96tf/1Srjf9Pq/b+t6J6vu9B/HRd3XnitV9md3v83FO80G7ihve/DqcXF0+PJhuLIzfsn+m/zvapzPTrXq+z/kT0rP/8fbH+mvKB7kjyT5Nn23OW9zWd/si/J80n2r1Ln328ceLdXmfivVtn/M33Ff/+Jg9u/PNKr/tuL/5ebjRlp7/H979Zut4OqbicAAAAAAAAAa6PRXAOvaIxeSzcao6OtNfweyqbG3PzC4v5j8x+cmmmtlbctQ43OTK+tXfNBx5vp5fzEDfnJJNuTfDFwXzM/Oj0/N1P1yUPNbe4R/6XfBqpuHbDurNcK9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q/1Jf6hlu5mXT8JCYl7NVH1nQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg/+HfAAAA///UDtxx") 03:37:08 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000640)='/dev/net/tun\x00'}, 0x30) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'macvtap0\x00', 0x1}) sendmsg$inet(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x30, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x6611, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={r6, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001340)={0xffffffffffffffff, r7}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(r9, 0x0, 0x240040c1) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r10, 0x0, 0xffe6) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r11, 0x0, 0xffe6) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x8, 0x28}, 0xffffffffffffffdb) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000000400)={r8}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000480)=ANY=[@ANYRESHEX=r5, @ANYRES16=r7, @ANYBLOB="0000000000000000806cff07570000002ca6300004000000"], 0x0, 0x15, 0xc7, &(0x7f0000000200)=""/199, 0xe819d622a0f35a33, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x22281, 0xffffffffffffffff, 0x0, &(0x7f0000000540)=[r13, r11, r12, r13, r13]}, 0x80) ioctl$TUNSETNOCSUM(r3, 0x8914, 0x20000000) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) gettid() gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xc9a9}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) 03:37:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x7, 0x6, 0xff}, 0x14}}, 0x0) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x88f7ffff}}}}}}}, 0x0) 03:37:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x7, 0x6, 0xff}, 0x14}}, 0x0) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x88fbffff}}}}}}}, 0x0) 03:37:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/DvTFvIAzwCxhfEtwoqRbS1rQmaYCJRVrIxmLhu2kKIhRpaEyHEaOLCnRsT167YuWThyhUuNdE/QF0ZIjFE4k5r5vZeeim9hULrGObzSeb2nDnn5pyZk9/MndOTCdBYg9VHkWxL8mOSvsXsjRUGF/9cu3p+8s+r5yeLLCwc+71o1fvj6vnJTtXO97ZWH2UyVCblJ0UeXaHdubPn3p2YmZk+086PzJ96b2Tu7LkXTp6aODF9Yvr06MFXXh4fPTg2Pr5ux/rmhQ+PbX3rtSOfTf3w2+yFn7+u+rutXdZ9HOtlMIM3nssuz653YzV7sCtd9NfYEdakivdquAZa8b89fVkavO359qdaOwdsqIXK5p7FHy0A97AidfcAqEfnRl89/3a2f+u3B/W7cnjxAbAa92vtbbGkP2W7zsCy5/v1NJjk0MUjX1VbNmgeBgAAAKDJvjmc5PmV5v/KPNRVr0o/nGRXkkeS7E5a63oeS/J4kieSPNlZT7QGy+vfPP9TXr6jA+O2XDmcHGqv7bpx/q8z+5cdfe3c/6tMBorjJ2emX0xyX5KhDGyu8qOrtHHpu7+/71XWPf9XbVX7nbnAdj8u9y/7//TUxPzE3RwzS658nOzuX2n8i+srgYokTyXZc4dt/LJn/4leZbcefzbSwpfJvhXjf2nlYrH6+syR1vVgpHNVuNmno2Nv9Grf+Neriv8tq4//jqJ7ve7c2tu4tOviq73K7vT6v6l4u9XBTe19H0zMz58ZTTYVR2/eP7b2Pt+rOuejc76q8R/au/L9//72d6oTujfJ00meaa9d3te69yf7kzyX5MAqbf71+sF3epWJ/3pV4z+1pvhfe+LQzi+O9mr/9uL/pVZnhtp7/P67tdsdoLr7CQAAAAAAAMD6KFvvwCvK4evpshweXnyH3wPZUs7Mzs0fOD77/umpxXfl7chA2Vnptb1rPehoK72UH1uWH0+yM8nnff9r5YcnZ2em6j54aLitPeK/8mtf3b0DNpz3tUJziX9oLvEPzSX+obnEPzSX+IfmEv/QXOIfmkv8Q3OJf2iku3mvn4SExL2aqPvKBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDf8E8AAAD//9A63HI=") 03:37:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = getpid() close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x80, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x600, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xb61a, 0x13e}, 0x400, 0x244, 0x3, 0x0, 0x0, 0x9, 0x4, 0x0, 0x4, 0x0, 0x8}, r1, 0xa, 0xffffffffffffffff, 0x0) getpid() r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x200, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1000001, 0x4, 0xd}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x1, 0x812, 0xffffffffffffffff, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0xa}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018ecffff3bf100000000270000000100000f0200000000000000000000d3d41684371955688c62a60f84922b6760c39a835d82b83013fe0a52fbe74eb04c9a01823b5bd99720ff7fe1e47826504028785b911ff2ddcde2101ebc881f38f3f438b069b6b3342eaf5b288ef10ee852430000000000000000"], 0x0, 0x47}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0xff, 0x80, 0x1f, 0x7, 0x0, 0xfffffffffffffffe, 0x100, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1002, 0x8, 0x2000000, 0x5, 0xfffffffffffc0000, 0x0, 0x0, 0x0, 0x5}, r1, 0xa, r2, 0x8) r4 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)=0x200) perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x0, 0xb5, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000380)}, 0x200, 0x200000877a, 0x0, 0x3, 0x1, 0x7fff, 0x1ff, 0x0, 0x8}, 0x0, 0xf, r4, 0x0) getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x3, 0xfd, 0x3, 0x1, 0x0, 0x9, 0x20, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x2, @perf_config_ext={0x3ff, 0xfffffffffffffffa}, 0x8c8, 0x0, 0xf, 0x7, 0x5, 0x7, 0x9, 0x0, 0xfffff0be, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='blkio.bfq.time\x00', 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0xd, &(0x7f0000000a80)=ANY=[@ANYBLOB="180070e77e9bd63ba9660000583b0000186700000c0000407f88050a0000000085100000fcffe9ff186918001c000000064a950000000000000095000000000000001d61c033f8ffffff186b000009000000000000000000000018000000fdffffff000004000700000075ab4a62b7d580d5c08a2b48df1c8db00f3157a779843dc73530dc5b298b5022ee82da608db9fc72c649b0ebe511ae86d51eb44f26d4eef71d3a0b529b9b5b17ffe83ee007b708fb561c9783e190ed9c4ca20da8bdb671eb6fa876"], &(0x7f00000000c0)='syzkaller\x00', 0x59b, 0xaa, &(0x7f00000007c0)=""/170, 0x41000, 0x7, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xa, 0x3, 0xdd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000940)=[r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x89020000}}}}}}}, 0x0) [ 1678.548764][ T2285] tun0: tun_chr_ioctl cmd 1074025698 03:37:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000001480)) 03:37:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}, [@ldst={0x6, 0x3, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x89060000}}}}}}}, 0x0) 03:37:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000b00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 03:37:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gEjC+IbxVUimhrWxM0wUSirGRjMHHdtIUQCzW0JkKI0cSFOzcmrl2xc8nClStcaqJ/gLoyRGKIxJ3WzO1ceim9hULrGObzSeb2nDnn5pyZk9/MndOTCdBYg+VHkWxL8mOS/sXsjRUGF/9cu3p+8s+r5yeLLCwc+71o1/vj6vnJTtXO97aWH61kqJW0Piny6Artzp099+7EzMz0mSo/Mn/qvZG5s+deOHlq4sT0ienTowdfeXl89ODY+Pi6HeubFz48tvWt1458NvXDb7MXfv667O+2qqz7ONbLYAZvPJddnl3vxmr2YFe66K+xI6xJXxXzA+34356+LA3e9nz7U62dAzbUQmlzz+KPFoB7WJG6ewDUo3OjL59/O9u/9duD+l05vPgAWI77tWpbLOlPq6ozsOz5fj0NJjl08chX5ZYNmocBAAAAaLJvDid5fqX5v1Ye6qpXph9OsivJI0l2J+11PY8leTzJE0me7KwnWoPl9W+e/2ldvqMD47ZcOZwcqtZ23Tj/15n9y46+Kvf/MpOB4vjJmekXk9yXZCgDm8v86CptXPru7+97lXXP/5Vb2X5nLrDqx+X+Zf+fnpqYn7ibY2bJlY+T3f0rjX9xfSVQkeSpJHvusI1f9uw/0avs1uPPRlr4Mtm3YvwvrVwsVl+fOdK+Hox0rgo3+3R07I1e7Rv/epXxv2X18d9RdK/XnVt7G5d2XXy1V9mdXv83FW+3O7ip2vfBxPz8mdFkU3H05v1ja+/zvapzPjrnqxz/ob0r3//vr75TntC9SZ5O8ky1dnlf+96f7E/yXJIDq7T51+sH3+lVJv7rVY7/1Jrif+2JQzu/ONqr/duL/5fanRmq9vj9d2u3O0B19xMAAAAAAACA9dFqvwOvaA1fT7daw8OL7/B7IFtaM7Nz8weOz75/emrxXXk7MtDqrPTa3rUedLSdXsqPLcuPJ9mZ5PO+/7Xzw5OzM1N1Hzw03NYe8V/6ta/u3gEbzvtaobnEPzSX+IfmEv/QXOIfmkv8Q3OJf2gu8Q/NJf6hucQ/NNLdvNdPQkLiXk3UfWUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+G/4JwAA///MZtxz") 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x892f0000}}}}}}}, 0x0) 03:37:08 executing program 2: perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8800000, &(0x7f0000000340), 0x0, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="9041080b6d34a0e0653a59810c188c5e5c13210852409191206f2705a7cbced065ad094da4f280de25518b9406f8fb65112be351c6a725d0a08d93965b5ae36d99781b5b3b61c78c2fc39b5abaee7a0933110f3493ebefaa2dffd860440718f1f957") perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x19893a9f0a0e2244) 03:37:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x51, 0x6a, 0xa, 0xff00}, [@call={0x5f}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x8dffffff}}}}}}}, 0x0) 03:37:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0xfbffd, 0x20004, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r0, &(0x7f0000000540), 0x0}, 0x20) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xe8030000}}}}}}}, 0x0) [ 1679.007515][ T2314] tun0: tun_chr_ioctl cmd 1074025698 03:37:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x3, &(0x7f0000000640)=@framed, &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x100000) 03:37:08 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='&\'($+@@\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000040)='FROZEN\x00', 0x7) openat$cgroup_int(r2, &(0x7f00000000c0)='cpu.idle\x00', 0x2, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='page_pool_state_hold\x00', r1}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r1}, 0x8) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x5c00, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x19a3000000000002) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1001}) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xf5ffffff}}}}}}}, 0x0) 03:37:08 executing program 1: syz_clone(0x1000000, &(0x7f0000001380), 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x4db0a200, 0x0, 0x0, 0x0, &(0x7f0000001280), &(0x7f0000001640)) perf_event_open(0x0, r0, 0x1, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8a68a, 0x0, 0x3, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xab) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000840)=ANY=[@ANYBLOB="1805000000003000000000004b64ffec850000007d00000085050063b47ec9bdd5d7375144a5e688fb105e5565dbc318cf9920d0fe6ffbc81b7cf1c39f50aca7743abb37fc34da234568adb138c4fa9d63eadfea566b7d9a8d3cc8cefab687f7bc34a5c6d909bbd36362ffa53ebfed229876eb5fa7125151538203622b33f4f0bfd4d6cd60fa5d1a5d7a781455546316309a4f75d27bbcf086368fcef888fb60649e917e613d8794871dade4d1b4000000000000000000000000000000000000000000000000000000000000000083785d4f26626c319892e4853c38d8731bf5c30d4af4f18af1a09358df49c986a88d75d012ea723ffaf6195b85d4f06dd6b567bd22b7967b42865af607be734b3b506f12ef4d86fab82cf51e2f9d47d977edead3b04d21c0581f71ebe634cee02faa08dcfc6275ef9359a3595e4ded4840d61deba0"], &(0x7f0000000280)='GPL\x00', 0x87817, 0x0, 0x0, 0x80100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd7c}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000007c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={0x0, r4}, 0xfffffffffffffccf) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f40)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000500)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000540)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0xe, 0x1, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000e80)=[0xffffffffffffffff], &(0x7f0000000ec0)=[{0x3, 0x5, 0x8, 0x8}, {0x2, 0x2, 0x3, 0x7}, {0x5, 0x3, 0xf, 0x5}, {0x4, 0x4, 0x3, 0xb}, {0x3, 0x2, 0x8, 0xa}, {0x1, 0x1, 0xa, 0x8}], 0x10, 0xfff}, 0x90) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x48, 0x1f, 0x5, 0x0, 0x0, 0x1ff, 0xca0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x3}, 0x21, 0x8, 0xa67, 0x5, 0x8000000000000000, 0x6, 0xffff, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r1, 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x9, 0x3, &(0x7f0000000640)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x58, &(0x7f00000000c0)}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300), 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x7ff, 0x0}, 0x8) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000b00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r6}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={&(0x7f0000000340)="2882acc2e1ab82e0ef13438aaceb1a63bdec84dda902cf19bdd0bc194b608d475affffffff000000007df1aec3fee1f5eeb92ace00cb9555d34ee9280278286fe1dc5473895b66c9bc5ba4fbf7393f3af50b772ad1d09b31bbe585e8ec7d0378ba39a1f19bd5640de6fbe118e4de1032ff03000041de79e775e215f866", &(0x7f0000000280), &(0x7f0000000480)="2f661f118a2a660ebad7f9132d218c518357193f52874e5da089451a6e0fb4f4d69ab15fe302d48fcb4fe234caa31fe0c543d4347397b36405fcdf64ef2540cb4e0e8d1ab2ecff6f34d618abe4d14a73587584a44448784e", &(0x7f00000009c0)="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", 0x5, r8}, 0x38) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) close(r9) perf_event_open(&(0x7f00000006c0)={0x5, 0x80, 0xa5, 0x7f, 0x0, 0x6f, 0x0, 0x4009511, 0x90080, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x320ddeefb0f3916d, @perf_bp={&(0x7f0000000d00), 0x9}, 0x4020, 0x0, 0x36033152, 0x0, 0x1, 0x400, 0x1fc, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, r7, 0xa) write$cgroup_subtree(r9, &(0x7f0000000140)=ANY=[@ANYBLOB="ed"], 0x5) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000080)) 03:37:08 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000), 0xffe000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000100), 0x9) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) 03:37:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xffffa888}}}}}}}, 0x0) 03:37:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x5c}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, 0x10, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r1}, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x100, 0xfc, 0x9, 0x0, 0x1, 0x0, '\x00', r3}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xffffca88}}}}}}}, 0x0) 03:37:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57, 0x10, 0x0}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[], 0x1a000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) write$cgroup_int(r1, &(0x7f0000000140), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 03:37:08 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xffffdd86}}}}}}}, 0x0) [ 1679.313996][ T2331] wg1 speed is unknown, defaulting to 1000 03:37:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r0, r1) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000040)={0x10, 0x2}, 0x10) 03:37:09 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xfffff788}}}}}}}, 0x0) 03:37:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000b00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 03:37:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57, 0x10, 0x0}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 03:37:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57, 0x10, 0x0}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[], 0x1a000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) write$cgroup_int(r1, &(0x7f0000000140), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 03:37:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000240), &(0x7f0000000080)=0x90) 03:37:09 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xfffffb88}}}}}}}, 0x0) 03:37:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:09 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x15, &(0x7f0000000000), 0x8) 03:37:09 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xffffff7f}}}}}}}, 0x0) 03:37:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 03:37:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000380), &(0x7f0000000440)=0x88) 03:37:09 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xffffff8d}}}}}}}, 0x0) 03:37:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@authinfo={0x10}], 0x10}, 0x0) 03:37:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57, 0x10, 0x0}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[], 0x1a000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) write$cgroup_int(r1, &(0x7f0000000140), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 03:37:09 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0xfffffff5}}}}}}}, 0x0) 03:37:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000000)=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000000580)=[@rights, @rights], 0x20}, 0x0) 03:37:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240)={0x0, @in, 0x0, 0x0, 0x80, 0x0, 0x9}, 0x98) 03:37:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000240), &(0x7f0000000080)=0x90) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:10 executing program 1: r0 = socket(0x1c, 0x2, 0x0) close(r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000000), 0x4) 03:37:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240)={0x0, @in, 0x0, 0x0, 0x80}, 0x98) 03:37:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) connect$inet6(r2, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x2}}}}}}}}}, 0x0) 03:37:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57, 0x10, 0x0}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[], 0x1a000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) write$cgroup_int(r1, &(0x7f0000000140), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3MtrXNUfAPDvvXmUX9OfScVHra/Yqk2tJk4iRCGCQbuyG6ngOiRpKKaNNBFsCaLgwp0bwbWr7lx24cpVXSroH6CupBgkWNxp5M7c20wek2bSiVdyPx+4k3PmnOGcew/fO3NPDieAyhrMXpKIIxHxY0QcbWQ3Vhhs/Lm9ujz95+rydBJra+d/T+r1/lhdni6qFp/ry17SiKE0Iv0kiUe3aXfx6rV3p+bnZ6/k+ZGlS++NLF699sLFS1Nzs3Ozl2vjr7w8VhsfHRvr2Lm+ef3D831vvXb2s5kfflu4/vPXWX+P5GXN59EpgzG48Vo2ebbTjZXswaZ00l1iR2hLV0Rkw9VTj//+6Ir1weuPb38qtXPAvlrLHGpZ/NEacIAlUXYPgHIUX/TZ829x/Fu/PSjfymTjATAb99v50SjpjjSv07Pp+b6TBiNi4sbZr7Ij9mkeBgAAAKDKvpmMiOe3m/9L46Gmeln64Yg4FhGPRMTxiPq6nsci4vGIeCIinizWE7Vhc/2t8z/prT2dGLuyMhkxka/t2jj/V8z+xUBXnvt/lome5MLF+dkXI+K+iBiKnkNZvrZDGze/+/v7VmXN83/ZkbVfzAXm/bjVven/0zNTS1P3cs6sW/k44nj3duOf3FkJlETEUxFxYo9t/HLi9FyrsruPP/tp7cuIU9vG//rKxWTn9Zkj9fvBSHFX2OrT2ugbrdo3/uXK4v/wzuM/kDSv111sv42bx2682qpsr/f/3uTtegd78/c+mFpaulKL6E3ObX1/tP0+H1TF9SiuVzb+Qye3//6/P/9MdkFPRsTTEfFMvnb5VP27P+J0RDwXEWd2aPOv18ffaVUm/suVjf9MW/HffmLi6BfnWrW/u/h/qd6Zofwdv//ubrcDVHY/AQAAAAAAAOiMtL4HXpIO30mn6fBwYw+/B+JwOr+wuHTmwsL7l2cae+UNRE9arPTqb1oPWqun1/Ojm/Jj+d6Cn3f9r54fnl6Ynyn75KHi+lrEf+bXrrJ7B+w7+7VCdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/UF3iH6pL/EN1iX+opHvZ109CQuKgJsq+MwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8N/wTAAD//5qi3IA=") 03:37:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 03:37:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@un=@abs={0x8}, 0x8) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x3}}}}}}}}}, 0x0) 03:37:10 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x1c, 0x1c, 0x2}, 0x1c) getsockname(r0, 0x0, &(0x7f0000000080)) 03:37:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f0000000200)={&(0x7f0000000040)=@in={0x10}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@init={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @loopback}], 0x30}, 0x0) 03:37:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, 0x0, 0x0) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x4}}}}}}}}}, 0x0) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x5}}}}}}}}}, 0x0) 03:37:10 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x1c, 0x1c, 0x2}, 0x1c) 03:37:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r1, r0) 03:37:10 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000003380)={0x1c, 0x1c, 0x2}, 0x1c) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x6}}}}}}}}}, 0x0) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:10 executing program 1: open(0x0, 0x143042, 0x0) 03:37:10 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x1c, 0x1c, 0x2}, 0x1c) bind$inet6(r0, &(0x7f0000000440)={0x1c, 0x1c}, 0x1c) 03:37:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r0, r1) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000200), 0x10) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x7}}}}}}}}}, 0x0) 03:37:10 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x1c, 0x1c, 0x2}, 0x1c) sendto(r0, 0x0, 0x0, 0x100, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:10 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=""/49, 0x31}, 0x0) 03:37:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000080), &(0x7f00000000c0)=0x18) 03:37:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000180), &(0x7f0000000380)=0x4) 03:37:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f00000000c0)=0x18) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x8}}}}}}}}}, 0x0) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:10 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) dup2(r1, r0) r2 = dup(r0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f00000000c0), 0x88) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0xb}}}}}}}}}, 0x0) 03:37:10 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x1c, 0x1c, 0x1}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:10 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1c, 0x1c, 0x1}, 0x1c) 03:37:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvfrom$inet(r0, 0x0, 0x0, 0x80181, 0x0, 0x0) 03:37:10 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x2}}}}}}}}}, 0x0) 03:37:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10}, 0x10) 03:37:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000080), 0x98) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:10 executing program 0: mount(&(0x7f0000000000), &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0) 03:37:10 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x3}}}}}}}}}, 0x0) 03:37:10 executing program 3: open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) 03:37:10 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x400, &(0x7f0000000040), 0x4) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:10 executing program 1: socket$inet6_sctp(0x1c, 0x0, 0x84) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x4}}}}}}}}}, 0x0) 03:37:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000000), 0x88) 03:37:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000100)={0x40}, 0x10) 03:37:10 executing program 3: open$dir(0x0, 0x40001, 0x0) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x5}}}}}}}}}, 0x0) 03:37:10 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup(r0) sendto$inet6(r1, &(0x7f00000001c0)="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", 0x7b9, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003b40)=""/4100, 0x1004}], 0x1}, 0x0) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000000c0), 0x88) 03:37:10 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0x4) 03:37:10 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) r2 = dup(r1) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x81}, 0x10) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0xb}}}}}}}}}, 0x0) 03:37:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3MtrHdUfAPDvTB7l1/RnUvFR6yu2alOriTcRohDBoF3ZjVRwHZI0FNNGmgi2BFFw4c6N4NpVdy67cOWqLhX0D1BXUgwSLO40MvfONDePm+amN45kPh+Ym3PmnMs5M4fvzJ2TwwRQWYPZRxJxJCJ+jIhHGtmNFQYbf26vLk//ubo8ncTa2vnfk3q9P1aXp4uqxff6so80YiiNSD9J4tFt2l28eu3dqfn52St5fmTp0nsji1evvXDx0tTc7Nzs5dr4Ky+P1cZHx8Y6dqxvXv/wfN9br539bOaH3xau//x11t8jeVnzcXTKYAxuPJdNnu10YyV7sCmddJfYEdrSFRHZcPXU478/umJ98Prj259K7Rywr9Yyh1oWf7QGHGBJlN0DoBzFjT57/i22f+u3B+VbmWw8AGbjfjvfGiXdkeZ1ejY933fSYERM3Dj7VbbFPs3DAAAAAFTZN5MR8fx2839pPNRUL0s/HBHH8jVCxyPq63oei4jHI+KJiHiyWE/Uhs31t87/pLf2dGDsyspkxES+tmvj/F8x+xcDXXnu/1kmepILF+dnX4yI+yJiKHoOZfnaDm3c/O7v71uVNc//ZVvWfjEXmPfjVvem/0/PTC1N3csxs27l44jj3duNf3JnJVASEU9FxIk9tvHLidNzrcruPv7sp7UvI05tG//rKxeTnddnjtSvByPFVWGrT2ujb7Rq3/iXK4v/wzuP/0DSvF53sf02bh678Wqrsr1e/3uTt+sd7M33fTC1tHSlFtGbnNu6f7T9Ph9Uxfkozlc2/kMnt7//359/JzuhJyPi6Yh4Jl+7fKp+7484HRHPRcSZHdr86/Xxd1qVif9yZeM/01b8t5+YOPrFuVbt7y7+X6p3Zijf4/ff3e12gMruJwAAAAAAAACdkdbfgZekw3fSaTo83HiH3wNxOJ1fWFw6c2Hh/cszjXflDURPWqz06m9aD1qrp9fzo5vyYxFxNCI+7/pfPT88vTA/U/bBQ8X1tYj/zK9dZfcO2Hfe1wrVJf6husQ/VJf4h+oS/1Bd4h+qS/xDdYl/qC7xD9Ul/qGS7uW9fhISEgc1UfaVCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOC/4Z8AAAD//3wC3Ig=") 03:37:10 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000003380)={0x1c, 0x1c, 0x2}, 0x1c) 03:37:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x40}, 0x98) 03:37:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 03:37:10 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:10 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001400)=@un=@abs={0x8}, 0x8) 03:37:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000001480)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000001400)=[@sndrcv={0x2c}], 0x2c}, 0x0) 03:37:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:37:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:11 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 03:37:11 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x2}}}}}}}}}, 0x0) 03:37:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=@base={0x8, 0x0, 0x4, 0x533}, 0x48) 03:37:11 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x2000)=nil, 0x0) 03:37:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmsg$inet(r0, &(0x7f0000002700)={0x0, 0x0, &(0x7f0000002540)=[{0x0}, {&(0x7f0000000140)="f6", 0x1}], 0x2}, 0x0) 03:37:11 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 03:37:11 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c}, 0x1c) 03:37:11 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x3}}}}}}}}}, 0x0) [ 1681.602590][ T2585] __do_sys_memfd_create: 29 callbacks suppressed [ 1681.602611][ T2585] syz-executor.4[2585]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000000), 0x8) 03:37:11 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x20200, 0x0) 03:37:11 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x4}}}}}}}}}, 0x0) 03:37:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ppoll(&(0x7f0000000040)=[{r0, 0xa0ce}], 0x1, 0x0, 0x0, 0x0) 03:37:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x8}, 0xe) 03:37:11 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002040, 0x0) 03:37:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) 03:37:11 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x5}}}}}}}}}, 0x0) 03:37:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x8, 0x2}, 0xe) 03:37:11 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x6}}}}}}}}}, 0x0) 03:37:11 executing program 3: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 03:37:11 executing program 1: pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 03:37:11 executing program 2: pipe2$9p(&(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAMEAT(r0, 0x0, 0x0) 03:37:11 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000045c0), 0x280, 0x0) [ 1681.837251][ T2624] syz-executor.4[2624]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCGETS2(r0, 0x802c542a, 0x0) 03:37:12 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000b80)='./binderfs/custom1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SEND(r0, 0x5450, 0x0) 03:37:12 executing program 1: setreuid(0xffffffffffffffff, 0xee01) openat$urandom(0xffffffffffffff9c, &(0x7f0000000f40), 0x0, 0x0) 03:37:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x55, 0x6a, 0xa, 0xff00}, [@call={0x5f}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xff5b, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0xffffffffffffffff}, 0x23) 03:37:12 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x7}}}}}}}}}, 0x0) 03:37:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:12 executing program 3: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 03:37:12 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x8}}}}}}}}}, 0x0) 03:37:12 executing program 1: pipe2$9p(&(0x7f0000000780), 0x80800) 03:37:12 executing program 2: pipe2$9p(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, 0x0, 0x0) 03:37:12 executing program 0: newfstatat(0xffffffffffffff9c, &(0x7f0000000b80)='./file0\x00', 0x0, 0x0) 03:37:12 executing program 3: r0 = syz_io_uring_setup(0x7acf, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) 03:37:12 executing program 0: syz_clone(0x24185180, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1682.696561][ T2645] syz-executor.4[2645]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:12 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) 03:37:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3MtrHdUfAPDvTB7l1/RnUvFR6yu2alOriTcRohDBoF3ZjVRwHZI0FNNGmgi2BFFw4c6N4NpVdy67cOWqLhX0D1BXUgwSLO40MvfONDePm+amN45kPh+Ym3PmnMs5M4fvzJ2TwwRQWYPZRxJxJCJ+jIjHG9mNFQYbf26vLk//ubo8ncTa2vnfk3q9P1aXp4uqxff6so80YiiNSD9J4tFt2l28eu3dqfn52St5fmTp0nsji1evvXDx0tTc7Nzs5dr4Ky+P1cZHx8Y6dqxvXv/wfN9br539bOaH3xau//x11t8jeVnzcXTKYAxuPJdNnu10YyV7sCmddJfYEdrSFRHZcPXU478/umJ98Prj259K7Rywr9Yyh1oWf7QGHGBJlN0DoBzFjT57/i22f+u3B+VbmWw8AGbjfjvfGiXdkeZ1ejY933fSYERM3Dj7VbbFPs3DAAAAAFTZN5MR8fx2839pPNRUL0s/HBHHIuKRiDgeUV/X81i+ZuiJiHiyWE/Uhs31t87/pLf2dGDsyspkxES+tmvj/F8x+xcDXXnu/1kmepILF+dnX4yI+yJiKHoOZfnaDm3c/O7v71uVNc//ZVvWfjEXmPfjVvem/0/PTC1N3csxs27l44jj3duNf3JnJVASEU9FxIk9tvHLidNzrcruPv7sp7UvI05tG//rKxeTnddnjtSvByPFVWGrT2ujb7Rq3/iXK4v/wzuP/0DSvF53sf02bh678Wqrsr1e/3uTt+sd7M33fTC1tHSlFtGbnNu6f7T9Ph9Uxfkozlc2/kMnt7//359/JzuhJyPi6Yh4Jl+7fKp+7484HRHPRcSZHdr86/Xxd1qVif9yZeM/01b8t5+YOPrFuVbt7y7+X6p3Zijf4/ff3e12gMruJwAAAAAAAACdkdbfgZekw3fSaTo83HiH3wNxOJ1fWFw6c2Hh/cszjXflDURPWqz06m9aD1qrp9fzo5vyYxFxNCI+7/pfPT88vTA/U/bBQ8X1tYj/zK9dZfcO2Hfe1wrVJf6husQ/VJf4h+oS/1Bd4h+qS/xDdYl/qC7xD9Ul/qGS7uW9fhISEgc1UfaVCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOC/4Z8AAAD//2yy3Iw=") 03:37:12 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @local, {[@generic={0x0, 0x8, "04030e000000"}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 03:37:12 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0xb}}}}}}}}}, 0x0) 03:37:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 03:37:12 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x8941, 0x0) 03:37:12 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000440)={0x9, 'vlan0\x00'}) 03:37:12 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x10}}}}}}}}}, 0x0) 03:37:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000014c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000001500)={0x4, 0x8}, 0x10) 03:37:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000100)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 03:37:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) r3 = getpid() sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffd}, 0x0) unshare(0x40000000) sched_setaffinity(r0, 0x8, &(0x7f0000000a40)=0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd}) creat(&(0x7f0000000180)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$binfmt_misc(r5, &(0x7f00000000c0)=ANY=[], 0x4) fadvise64(r5, 0x0, 0x0, 0x4) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f0000000040)=[{&(0x7f00000000c0)="390000001300094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000d40)) sched_getparam(r0, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@private}}, &(0x7f0000000000)=0xe8) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000005c0)=@proc={0x10, 0x0, 0x25dfdbfc, 0x8}, 0xc, &(0x7f00000009c0)=[{&(0x7f00000001c0)=ANY=[@ANYRES8, @ANYRES32=r7, @ANYRES16=r3], 0x134}, {0x0, 0x14}], 0x2, 0x0, 0x0, 0x8005}, 0x800) 03:37:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000001040)={0x7, 0x9}) [ 1682.830925][ T2671] syz-executor.4[2671]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:12 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x2f}}}}}}}}}, 0x0) 03:37:12 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1}, 0x18) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r3, 0x1}, 0x18) write(r0, &(0x7f0000000500)='t', 0x1) 03:37:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @empty}, 0x10) 03:37:12 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x3c}}}}}}}}}, 0x0) 03:37:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gEjC+IbxVUimhrWxM0wUSirGRjMHHdtIUQCzW0JkKI0cSFOzcmrl2xc8nClStcaqJ/gLoyRGKIxJ3WzO1ceim9hULrGObzSeb2nDnn5pyZk9/MndOTCdBYg+VHkWxL8mOSJxezN1YYXPxz7er5yT+vnp8ssrBw7PeiXe+Pq+cnO1U739tafrSSoVbS+qTIoyu0O3f23LsTMzPTZ6r8yPyp90bmzp574eSpiRPTJ6ZPjx585eXx0YNj4+PrdqxvXvjw2Na3Xjvy2dQPv81e+Pnrsr/bqrLu41gvgxm88Vx2eXa9G6vZg13por/GjrAmfUnK4Rpox//29GVp8Lbn259q7RywoRZKm3sWf7QA3MOK1N0DoB6dG335/NvZ/q3fHtTvyuHFB8By3K9V22JJf1pVnYFlz/fraTDJoYtHviq3bNA8DAAAAECTfXM4yfMrzf+18lBXvTL9cJJdSR5Jsjtpr+t5LMnjSZ6o1g4NrrH95fVvnv9pXb6jA+O2XDmcHKrWdt04/9eZ/cuOvir3/zKTgeL4yZnpF5Pcl2QoA5vL/OgqbVz67u/ve5V1z/+VW9l+Zy6w6sfl/mX/n56amJ+4m2NmyZWPk939K41/cX0lUJHkqSR77rCNX/bsP9Gr7Nbjz0Za+DLZt2L8L61cLFZfnznSvh6MdK4KN/t0dOyNXu0b/3qV8b9l9fHfUXSv151bexuXdl18tVfZnV7/NxVvtzu4qdr3wcT8/JnRZFNx9Ob9Y2vv872qcz4656sc/6G9K9//76++U57QvUmeTvJMtXZ5X/ven+xP8lySA6u0+dfrB9/pVSb+61WO/9Sa4n/tiUM7vzjaq/3bi/+X2p0Zqvb4/XdrtztAdfcTAAAAAAAAgPXRar8Dr2gNX0+3WsPDi+/weyBbWjOzc/MHjs++f3pq8V15OzLQ6qz02t61HnS0nV7Kjy3LjyfZmeTzvv+188OTszNTdR88NNzWHvFf+rWv7t4BG877WqG5xD80l/iH5hL/0FziH5pL/ENziX9oLvEPzSX+obnEPzTS3bzXT0JC4l5N1H1lAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPhv+CcAAP//ZQrcjg==") 03:37:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) fstatfs(r0, &(0x7f0000000080)=""/166) 03:37:12 executing program 3: setrlimit(0xe, &(0x7f0000000380)={0xbe, 0x7fff}) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000001100)=0x1, 0x4) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x18115, @rand_addr, 0x983a}, 0x1c) recvmmsg(r2, &(0x7f0000000d80)=[{{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000002140)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000cc0)=""/143, 0x8f}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x100, 0x0) [ 1683.069198][ T2705] syz-executor.0[2705]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1683.081058][ T2703] syz-executor.4[2703]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1683.101274][ T2706] wg1 speed is unknown, defaulting to 1000 [ 1683.191532][ T2701] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 03:37:12 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xd, 0x18, 0xfa00, @ib_path={0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}}, 0x20) 03:37:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) 03:37:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="011825bd7000ffdbdf25120000000c009900000800004500000005001301020000e81b00118004000300040003000400060004000200040004000400060006001201"], 0x54}}, 0x0) 03:37:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:13 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}}}}}}}, 0x0) 03:37:13 executing program 2: r0 = socket(0x11, 0xa, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={0x0, 0xd8}}, 0x0) 03:37:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000480), 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40104593, &(0x7f00000004c0)=[0x0, 0x2000]) 03:37:13 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x3}}}}}}}}}, 0x0) 03:37:13 executing program 1: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCFLSH(r0, 0x80045438, 0x1000000000000) 03:37:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x1}]}]}}, 0x0, 0x32, 0x0, 0x8}, 0x20) [ 1683.817548][ T2721] syz-executor.4[2721]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:13 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c53d206a0a0689d907c01e3774d533f6030b9d24f970fbe0819c2befebde5a31ef7ef419e7217d675013a1720e8a2a6bab5cad26f9465a59b921e9e5828f6dd1"}, 0x48, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0) 03:37:13 executing program 2: r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000002700), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000002900)={0x0, 0x0, &(0x7f00000028c0)={&(0x7f0000002880)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000005"], 0x28}}, 0x0) 03:37:13 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000080)={0x0, 0x7, 0x5}, 0x8) 03:37:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000007c0)={0x4, 0x0, @multicast2}, 0x10) 03:37:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f00000024c0)={0x1f, 0x0, @fixed, 0x4, 0x2}, 0xe) 03:37:13 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x0, 0x0, 0x0, 0x0, 0x1346, 0x1, 0x7d28c909}, 0x48) 03:37:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8955, &(0x7f0000000340)={{0x2, 0x0, @multicast1}, {0x0, @multicast}, 0x6, {0x2, 0x0, @broadcast}, 'netdevsim0\x00'}) 03:37:13 executing program 2: mremap(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x4000, 0x0, &(0x7f0000ff1000/0x4000)=nil) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 03:37:13 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 03:37:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") [ 1683.966452][ T2742] syz-executor.4[2742]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000000140)=@phonet={0x23, 0x0, 0x0, 0x9}, 0x80, &(0x7f0000002200)=[{&(0x7f0000001fc0)="c6", 0x1}], 0x1}}], 0x1, 0x0) 03:37:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000002480)=""/4096, &(0x7f0000003480)=0x1000) 03:37:13 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) [ 1684.057722][ T2762] syz-executor.4[2762]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1684.099457][ T2770] IPVS: length: 4096 != 8 03:37:14 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDSKBENT(r0, 0x4b31, &(0x7f0000000000)) 03:37:14 executing program 0: socketpair(0x11, 0xa, 0x0, &(0x7f0000000c00)) 03:37:14 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vlan1\x00'}}]}, 0x38}}, 0x0) 03:37:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:14 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000340)={{0x0, 0x2}}) 03:37:14 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2140, 0x0) 03:37:14 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 03:37:14 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) sendmsg$rds(r0, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) 03:37:14 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000003b445b27ffff7e"], 0x28}}, 0x0) 03:37:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") [ 1684.878658][ T2779] syz-executor.4[2779]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1684.888149][ T2783] rdma_rxe: rxe_newlink: rxe creation allowed on top of a real device only 03:37:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000180)={{0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 03:37:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in={0x2, 0x0, @rand_addr=0x64010100}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000040)="a3", 0x1}], 0x1, &(0x7f0000000340)=[@init={0x18, 0x84, 0x0, {0x6}}], 0x18}, 0x0) 03:37:14 executing program 3: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_io_uring_setup(0x1430, &(0x7f0000000140), 0x0, 0x0) syz_io_uring_setup(0x31f9, &(0x7f0000000240), 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, r0/1000+60000}) 03:37:14 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) 03:37:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:14 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) getdents(r0, &(0x7f00000016c0)=""/4096, 0x1000) 03:37:14 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}}, 0x0) 03:37:14 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8) [ 1684.989132][ T2796] __nla_validate_parse: 3 callbacks suppressed [ 1684.989149][ T2796] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:37:14 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}}}, 0x0) 03:37:14 executing program 1: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:37:14 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0xecf86c37d53048fb) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x78) close(r0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/block/loop0', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) 03:37:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:14 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}}, 0x0) [ 1685.048669][ T2796] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:37:15 executing program 2: r0 = fsopen(0x0, 0x0) ioctl$FIBMAP(r0, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='setgroups\x00') set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)='net/nfsfs\x00') connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES8, @ANYRES64=0x0], 0x20000600}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000800)='./file1/file0\x00', &(0x7f0000000300)={0x202440, 0x0, 0x1e}, 0x18) getdents64(0xffffffffffffffff, &(0x7f0000000340)=""/1, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000540)=""/140, 0x8c) set_mempolicy(0x1, &(0x7f0000000600), 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f000010d000/0x3000)=nil) socket(0x0, 0x803, 0x0) 03:37:15 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f0000001240)=""/4096, 0x1000}], 0x1, 0x5, 0x0) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}}}}}, 0x0) 03:37:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x2, 0x0, 0x0) 03:37:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}) 03:37:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x10) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x894c, 0x0) 03:37:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x4, 0x4, 0x3ff}, 0x48) close(r0) 03:37:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUYB+DfTFuIgBaMH4hfFVSKaGtbEzTBRKKsZGMwcd20hRALNbQmQojRxIU7NyauXbFzycKVK1xqon+AujJEYojEndbM7b20lt5CoXVM53mS6T3nnrk5Z+bknXvn9M0EaKyB6k+R7EjyY5L+JFuW7zCw8HL92oWJP69dmCgyP3/896L6WP64dmGis2vRft1e/SmTwTIpPyny6Ar9zp47/+749PTU2XZ9eO70e8Oz586/cOr0+Mmpk1NnRg698vLYyKHRsbF1O9Y3L354fPtbrx39bPKH32Yu/vx1Nd4d7balx7FeBjJw45ws9+x6d1azB5eUi94aB8Ka9CSppquvFf/96cni5PXn259qHRywoeYrW7s2fzQPbGJF6h4BUI/OF311/9vZ/qvfHtTv6pGFG8Bq3q+3t4WW3pTtffqW3d+vp4Ekhy8d/araskHrMAAAAABN9s2RJM+vtP5X5qEl+1Xlh5PsTvJIkj1JK6/nsSSPJ3kiyZOdfKI1WL7/zes/5ZU7OjBuy9UjyeF2bte/1/86q3/Z2dOu3VtV0lecODU99WKS+5IMpm9rVR9ZpY/L3/39fbe2pet/1Vb131kLbI/jSu+y/09Pjs+N380xs+jqx8me3pXmv7iRCVQkeSrJ3jvs45e9B052a7v1/LOR5r9M9q8Y/4uZi8Xq+ZnDrevBcOeqcLNPR0bf6Na/+a9XFf/bVp//ncXSfN3ZtfdxefelV7u13en1f0vxdmuAnVzlD8bn5s6OJFuKYze/P7r2MW9WnfPROV/V/A/uW/n7//72Z6oTui/J00meaecu72999ycHkjyX5OAqff71+qF3urWJ/3pV8z+5pvhfe+Hwri+Odev/9uL/pdZgBtvv+P13a7c7QXWPEwAAAAAAAID1UbaegVeUQzfKZTk0tPAMvweyrZyemZ07eGLm/TOTC8/K25m+spPp1b8kH3SkVV6sjy6rjyXZleTznnta9aGJmenJug8eGm57l/iv/NpT9+iADed5rdBc4h+aS/xDc4l/aC7xD80l/qG5xD80l/iH5hL/0FziHxrpbp7rp6CgsFkLdV+ZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP4f/gkAAP//jxLcgw==") 03:37:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x4, 0x1, 0x101}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x7, 0x1, 0x201}, 0x14}}, 0x0) 03:37:15 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/vmallocinfo\x00', 0x0, 0x0) accept$nfc_llcp(r0, 0x0, 0x0) 03:37:15 executing program 0: r0 = msgget(0x3, 0x222) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = msgget(0x3, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) r2 = msgget(0x3, 0x0) msgctl$IPC_RMID(r2, 0x0) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 03:37:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:15 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x7fffdf004000, 0x1, 0x11, r0, 0x0) 03:37:15 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)=ANY=[@ANYBLOB="ff68ff006d16df"]) 03:37:15 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000e80), 0x6) write$bt_hci(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="01f8ff"], 0x8) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) 03:37:15 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f00000027c0)={0xec4, 0x453, 0x0, 0x0, 0x0, "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", [""]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 03:37:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000f80)='environ\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/53, 0x35}], 0x1, 0x503, 0x0) 03:37:15 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}}, 0x0) [ 1686.114674][ T27] audit: type=1400 audit(2000000235.266:143031): avc: denied { audit_write } for pid=2870 comm="syz-executor.3" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 03:37:15 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0xc4c03d09, 0x0) 03:37:15 executing program 2: msync(&(0x7f0000ff4000/0x1000)=nil, 0x1000, 0x5) 03:37:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:15 executing program 1: mq_getsetattr(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}}}, 0x0) 03:37:15 executing program 3: r0 = socket(0x840000000002, 0x3, 0x100) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x8, 0x4) [ 1686.136866][ T27] audit: type=1107 audit(2000000235.266:143032): pid=2870 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='츦ŒÃ2o`7upŠÕ¾#4*¼X¦ufÙ$ŠÊÁ'z½Ó¾#Ä?q«I$Ϋnd:¾Âuó}~ÀRS2mC.L^ËÄÉD!‹ ÃÇ$ïD3F!£Óò@S&›ê@Í)£µ ^""5¤‚:¦ðño¥¿Mý²JÄÞ÷\ôeºê"_H‰áA—A|‰$鏿ãÀvxc|“?Ä®rAI3ɬÜè.ÈHd™° òÜV¥®«ª<Ò{ [ 1686.136866][ T27] Qs0K5%FÞY€šèŸö‡#Rz nuë¢lzýàœ¿Œ“÷J9$Óåë Qx¡y×z•Õ^M»½IÂÙ”&ü&Åñ-˜zÅ#£¾â3$ F¡ìŒ°5‹‡~2y‡Íõ³/”ñ‡H«D£ªí<¯ŸAÔ”í²¼Iµò¼Õî…?«aOS¡¢ÿòZ^K±à’™V]½ò|¢âÊßgŠÓð' 03:37:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x20, r1, 0x201, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 03:37:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20000801) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}}, 0x0) 03:37:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:15 executing program 0: mknod(&(0x7f0000000000)='./file2\x00', 0x1000, 0x0) open(&(0x7f0000000580)='./file2\x00', 0x1, 0x0) open(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) [ 1686.256274][ T27] audit: type=1400 audit(2000000235.397:143033): avc: denied { read } for pid=2887 comm="syz-executor.0" name="ptp0" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1686.280021][ T27] audit: type=1400 audit(2000000235.397:143034): avc: denied { open } for pid=2887 comm="syz-executor.0" path="/dev/ptp0" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}}}}}, 0x0) 03:37:15 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x40046207, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="04630440"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000040)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x4c, 0x0, &(0x7f0000000240)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000180)={@flat=@handle={0x77682a85}, @flat, @ptr={0x70742a85, 0x0, 0x0}}, &(0x7f0000000200)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) 03:37:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d0f65acc0d06d1a1434e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab0300817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c690220b87b20581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f29e5dad9796edb697a8ad004eea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc518afc9ffc2cc788bee1b47683db01a2f9398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa407e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db00002e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d50200a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afd80e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db08407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4092140faed0c329be610c3082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa520000afe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d6fccbecfae5553d9950d48c774eaa35b24fce69a20d8bc410d9f48bf7eac90529cd6af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85e9bb70a3009a5d30f479e293a3302e11350ea857b37e76ca2f50378e4092ce2c574ad278b9b7b717c571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c545e25f1cd62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f981179186e4000000000000646174b55d251f7f8ca5ccc22a5efb33b237eff5597a3c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511726f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4445eef08401cd1a3e266db41474e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24c5efd5c8495c1ccd580033c55725f2d60354f8ad5914a0155eaa743350ddb388f486b6de0549ef3b1b3c3b7d4d3a830ff39885776119408029be3788dd8422b1ab7b4c9d5b7d8682fd759c713108e1bdfc64b9121bbf07099def5c0ce3c861ae4b5cad8bba5a0b6059b9ef90c2f96a59320309e25df89484522bb1d6eaa92164f9e4042cb689a45a898354c17b08705205a9189772bcbcb6414e44b33a2470d3bc16f761c33f565b9da5e7991ad8482579cc1b16c1fcec815a5482ae8b1779c5e339971a6ec1217bcfd1ef24284de8a0a9f068f297037d6478c2434a9a18dcc6c7c791e444a79d7ce37f9cf2a434b9048ca6a2fa254aa02cd098026798a6d336348af0fc11fa2809a5ebbe17ca4d0f889d518f64ee50f562b5fdb1f76d4a7fe14701f8ed0c6a55d66a6efea3e449e6b4783d66661a92f174"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847e0ffff2000000000210000ac141417e0", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 03:37:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) [ 1686.304429][ T27] audit: type=1400 audit(2000000235.397:143035): avc: denied { ioctl } for pid=2887 comm="syz-executor.0" path="/dev/ptp0" dev="devtmpfs" ino=220 ioctlcmd=0x3d09 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1686.322846][ T2897] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 03:37:15 executing program 2: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x4850) 03:37:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x2004077d, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000003200)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000180)="2e5ba98d63e59206870b884682aca2da25d4b4f447e56e4fc0405ab3f30e8207c1333158a7361de249ef567cac693c1322b25d76a309b10c7e3e2689843e653f7b7533e2b7443dbc6978d0", 0x4b}, {&(0x7f0000000300)="161e39723feb485a1f1b55d260913cfd884908d3ece2d7c5d0f65b0f0fbb55bf4b568f", 0x23}], 0x2}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)='\t', 0x1, 0x11, 0x0, 0x0) 03:37:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUYB+Df3LYQAS0YPxC/KqgU0da2JmiCiURZycZg4rppCyEWamhNhBCjiQt3bkxcu2LnkoUrV7jURP8AdWWIxBCJO62Z27m0lt5CoXVM53mS6T3nnrk5Z+bknXvn9M0EaKyB8k+R7EjyY5L+JPct32Fg4eX6tQsTf167MFFkfv7470X5sfxx7cJEZ9eiet1e/mklg62k9UmRR1fod/bc+XfHp6enzlb14bnT7w3Pnjv/wqnT4yenTk6dGTn0ystjI4dGx8bW7VjfvPjh8e1vvXb0s8kffpu5+PPX5Xh3VG1Lj2O9DGTgxjlZ7tn17qxmDy4pF701DoQ16UlSTldfO/7705PFyevPtz/VOjhgQ82XtnZt/mge2MSK1D0CoB6dL/ry/rez/Ve/Pajf1SMLN4DlvF+vtoWW3rSqffqW3d+vp4Ekhy8d/arcskHrMAAAAABN9s2RJM+vtP7XykNL9ivLDyfZneSRJHuSdl7PY0keT/JEkic7+URrsHz/m9d/Wlfu6MC4LVePJIer3K5/r/91Vv+ys6eq3VtW0lecODU99WKVJzaYvq1lfWSVPi5/9/f33dqWrv+VW9l/Zy2wGseV3mX/n54cnxu/m2Nm0dWPkz29K81/cSMTqEjyVJK9d9jHL3sPnOzWduv5ZyPNf5nsXzH+FzMXi9XzM4fb14PhzlXhZp+OjL7RrX/zX68y/retPv87i6X5urNr7+Py7kuvdmu70+v/luLt9gC3VO99MD43d3Yk2VIcu/n90bWPebPqnI/O+Srnf3Dfyt//91efKU/oviRPJ3mmyl3e3/7uTw4keS7JwVX6/Ov1Q+90axP/9Srnf3JN8b/2wuFdXxzr1v/txf9L7cEMVu/4/XdrtztBdY8TAAAAAAAAgPXRaj8Dr2gN3Si3WkNDC8/weyDbWtMzs3MHT8y8f2Zy4Vl5O9PX6mR69S/JBx1plxfro8vqY0l2Jfm85552fWhiZnqy7oOHhtveJf5Lv/bUPTpgw3leKzSX+IfmEv/QXOIfmkv8Q3OJf2gu8Q/NJf6hucQ/NJf4h0a6m+f6KSgobNZC3VcmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgP+HfwIAAP//cFLciw==") 03:37:15 executing program 0: openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x8442, 0x0, 0x1}, 0x18) 03:37:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}, 0x0) 03:37:15 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x4204, &(0x7f0000000080)=ANY=[], 0x8, 0x2fd, &(0x7f0000000440)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x1a484bc, &(0x7f0000000ac0)=ANY=[@ANYRES64, @ANYBLOB="eea73c3ca047349ab66d529fb1a5bdc61875c6ccebea30ba1b89772f995ea3e0ed04f986b68ee600044bd75d3cfd10cc2ec88ccff020447cd9caded4abf65767e9dbbd7b67da68791fea5841a8ce3eb44c719a2e6c341bf68b2a0af04f3208000000f49a8319bdc88128f6771cc951b190c7fd36ffdbd0622c1612331455b3f465def5740814395f095fc44a4cf6fe14b0d31f384214d59a0105d577557215473973f3b70178f49f0e48dbe138562f460353d44bb0738fc1050056fdd2fa3229e2ece7cf96435bca09f70ba7f31e69c4b73ba3d172906ffc90f5de134a696a8e1d20a9cf70009a31f83d4b774b4279b470f14db9cdbde3837496b3b65e908b097bbc391e5ccfafaf8538e518e32297e42f72394722918775558989d46a4f1238532742c6940896321dbf52c2f05e51cdfa9398ed4398f7f1e9de19c9d14fa436925cff0e3164db53e8d4c3feb833659bf31267bfd8afe5b966c300000000000000000000000015375bae6c0e44efe3a12792afb4e2270f82053edc365c8cb8a5e2152abe01ac55feb939b4663c3bc15e4262afb9a3e1f7617a1bc80f306f318c93c5322be4dd1f0cb3d5686a9802e01c766f22aab3ec85ef72b6bd6d4a8480a664be6c96b7c6996f0a8c69ea87d55e7a182b2f41f8c8f30ac2d8652fc62dc73765506afe595a9e1b5002f2fcc6688025214d9a30f8f63d9b580ef605063492950e9fa48536fa634beb912d8db8cf8a9ad991a73ce1e60b", @ANYRES16=r0, @ANYRESDEC, @ANYRES8, @ANYRES16, @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESHEX, @ANYRES64], 0x1, 0x0, &(0x7f0000000100)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000300)='./bus\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) 03:37:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x2004077d, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000003200)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000180)="2e5ba98d63e59206870b884682aca2da25d4b4f447e56e4fc0405ab3f30e8207c1333158a7361de249ef567cac693c1322b25d76a309b10c7e3e2689843e653f7b7533e2b7443dbc6978d0", 0x4b}, {&(0x7f0000000300)="161e39723feb485a1f1b55d260913cfd884908d3ece2d7c5d0f65b0f0fbb55bf4b568f", 0x23}], 0x2}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)='\t', 0x1, 0x11, 0x0, 0x0) 03:37:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r4, 0x8983, &(0x7f00000000c0)={0x1, 'bond_slave_0\x00'}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r2, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'nl80211\x00'}, {0x20, '(,-!*-%\xf8+'}, {0x20, '#*/!$'}, {0x20, 'wlan1\x00'}, {}, {0x20, '}}],..,*'}, {0x20, 'nl80211\x00'}, {0x20, 'nl80211\x00'}], 0xa, "157cbcfb4b8ea03afdf52c72c464ec6606efc285e4820c6c34578c25e0a2748ad92f35c437846673a7640e08708c1f935dd710701b8806c54ec407e0b8269ca4bf8c70c9c2bfe22f954bc23c94814dd74788fd460ccf83e53bd8219e2667b572d78be263d06cfbde6be9e3de1a8136bb1d00193f6def012ac00e7d76fc76e868f22927dedd544cad9d57bb897234bc3cf095e81671e5069a2081409666c431f8fdf4b377ce"}, 0xec) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x40, r8, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x40}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x40, r10, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="98030000", @ANYRES16=r5, @ANYRES32=r10, @ANYRES32=r6], 0x398}}, 0x0) sendfile(r2, r1, 0x0, 0x100004001) 03:37:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}}}}}}}}, 0x0) 03:37:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdu5tJTeQqF1TOfzSab3nDlzc87MyW/mzunJCdBYA+WfItmR5Mck/dV20wEDCx/Xr12Y+PPahYki8/PHfy/Kr+WPaxcmOocW1ef28k8rGWwlrU+KPLpCvbPnzr87Pj09dbbKD8+dfm949tz5F06dHj85dXLqzMihV14eGzk0Oja2buf65sUPj29/67Wjn03+8NvMxZ+/Ltu7oypbeh7rZSADN67Jcs+ud2U1e3BJuuitsSGsSU+Ssrv62vHfn54sdl5/vv2p1sYBG2q+tLVr8UfzwCZWpO4WAPXoPOjL99/O9m/99qB+V48svACW/X692hZKetOqjulb9n6/ngaSHL509KtyywaNwwAAAAA02TdHkjy/0vhfKw8tOa5MP5xkd5JHkuxJ2vN6HkvyeJInkjzZmU+0BsuPv3X8p3Xlrk6MO3L1SHK4mtt18/hfZ/QvO3uq3P/LTPqKE6emp15Mcl+SwfRtLfMjq9Rx+bu/v+9WtnT8r9zK+jtjgVU7rvQu+//05Pjc+L2cM4uufpzs6V2p/4sbM4GKJE8l2XuXdfyy98DJbmW373820vyXyf4V439x5mKx+vzM4fb9YLhzV7jVpyOjb3SrX//Xq4z/bav3/85i6Xzd2bXXcXn3pVe7ld3t/X9L8Xa7gVuqfR+Mz82dHUm2FMdu3T+69jZvVp3r0bleZf8P7lv5+X9/9Z3ygu5L8nSSZ6q5y/vbz/7kQJLnkhxcpc6/Xj/0Trcy8V+vsv8n1xT/a08c3vXFsW7131n8v9RuzGC1x++/27vTDqq7nQAAAAAAAACsj1Z7DbyiNXQj3WoNDS2s4fdAtrWmZ2bnDp6Yef/M5MJaeTvT1+rM9OpfMh90pJ1ezI8uy48l2ZXk857/tfNDEzPTk3WfPDTc9i7xX/q1p+7WARvOeq3QXOIfmkv8Q3OJf2gu8Q/NJf6hucQ/NJf4h+YS/9Bc4h8a6V7W9ZOQkNisibrvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//2x63Iw=") 03:37:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000840)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000680)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000a40)=[@pktinfo={{0x24, 0x29, 0x32, {@local}}}], 0x28}}], 0x2, 0x0) 03:37:15 executing program 1: syz_io_uring_setup(0x7285, &(0x7f0000000000)={0x0, 0x0, 0xc86}, &(0x7f0000000080), &(0x7f00000000c0)) [ 1686.512482][ T2939] loop2: detected capacity change from 0 to 128 03:37:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x2}]}, {0x0, [0x0]}}, 0x0, 0x27}, 0x20) 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f}}}}}}}}}, 0x0) 03:37:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:15 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c}}}}}}}}}, 0x0) 03:37:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={0x0}, 0x1, 0x0, 0xf0}, 0x0) 03:37:16 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) sched_setscheduler(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000080), 0xb, 0x101301) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000580)) ioctl$USBDEVFS_IOCTL(r2, 0x80045519, 0x0) 03:37:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:16 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x2}}}}}}}}, 0x0) 03:37:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)={0x38, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "4ff5677c1a"}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}]}, 0x38}}, 0x0) 03:37:16 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x3}}}}}}}}, 0x0) 03:37:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:16 executing program 2: syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00004, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYBLOB="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"/909], 0x4, 0x4da, &(0x7f0000000600)="$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") creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 1687.007687][ T2974] __do_sys_memfd_create: 13 callbacks suppressed [ 1687.007703][ T2974] syz-executor.4[2974]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:16 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x4}}}}}}}}, 0x0) 03:37:16 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x5}}}}}}}}, 0x0) [ 1687.100314][ T2992] syz-executor.4[2992]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1687.100430][ T2993] syz-executor.2[2993]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1687.150607][ T2993] loop2: detected capacity change from 0 to 512 [ 1687.179912][ T2993] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1687.192601][ T2993] ext4 filesystem being mounted at /root/syzkaller-testdir2435144040/syzkaller.EL7ASs/1569/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 1687.218667][ T9817] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1687.410964][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:16 executing program 0: ioperm(0x0, 0x48, 0x6) clock_nanosleep(0x0, 0x0, 0x0, 0x0) 03:37:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:16 executing program 1: clock_gettime(0x6, &(0x7f0000001200)) 03:37:16 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0xb}}}}}}}}, 0x0) 03:37:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:16 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/meminfo\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/128, 0x80, 0x22) 03:37:16 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x10}}}}}}}}, 0x0) 03:37:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000100), 0x0) 03:37:17 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x30b}}}}}}}}, 0x0) [ 1687.946861][ T3007] syz-executor.4[3007]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:17 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000780)={'wpan1\x00'}) 03:37:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000045c0), 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) 03:37:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZoglGirGRjMHHdtIUQCzW0JkKI0cSFOzcmrl2xc8nClStcaqJ/gLoyRGKIxJ3WzO1cWktvodA6pvP5JNN7zpy5OWfm5Ddz5/TkBGisgfJPkexI8kOS/iSvLD9gYOHj+rULE39cuzBRZH7++G9F+bX8fu3CROfQovrcXv5pJYOtpPVxkYdXqHf23Pl3xqenp85W+eG50+8Oz547/9yp0+Mnp05OnRk59NKLYyOHRsfG1u1c37j4wfHtb7569NPJ73+dufjTV2V7d1RlS89jvQxk4MY1We7p9a6sZvcvSRe9NTaENelJUnZXXzv++9OTxc7rzzc/1to4YEPNl7Z2Lf5wHtjEitTdAqAenQd9+f7b2f6t3x7U7+qRhRfAst+vV9tCSW9a1TF9y97v19NAksOXjn5ZbtmgcRgAAACAJvv6SJJnVxr/a+WBJceV6QeT7E7yUJI9SXtezyNJHk3yWJLHO/OJ1mD58TeP/7Su3NGJcVuuHkkOV3O7/jn+1xn9y86eKvf/MpO+4sSp6annk9yTZDB9W8v8yCp1XP72r++6lS0d/yu3sv7OWGDVjiu9y/4/PTk+N34358yiqx8le3pX6v/ixkygIskTSfbeYR0/7z1wslvZrfufjTT/RbJ/xfhfnLlYrD4/c7h9Pxju3BVu9snI6Ovd6tf/9Srjf9vq/b+zWDpfd3btdVzefenlbmV3ev/fUrzVbuCWat/743NzZ0eSLcWxm/ePrr3Nm1XnenSuV9n/g/tWfv7fW32nvKD7kjyZ5Klq7vL+9rM/OZDkmSQHV6nzz9cOvd2tTPzXq+z/yTXF/9oTh3d9fqxb/bcX/y+0GzNY7fH779Zut4PqbicAAAAAAAAA66PVXgOvaA3dSLdaQ0MLa/jdl22t6ZnZuYMnZt47M7mwVt7O9LU6M736l8wHHWmnF/Ojy/JjSXYl+aznf+380MTM9GTdJw8Nt71L/Jd+6am7dcCGs14rNJf4h+YS/9Bc4h+aS/xDc4l/aC7xD80l/qG5xD80l/iHRrqbdf0kJCQ2a6LuOxMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAf8PfAQAA//+z69y8") 03:37:17 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x19, r0, 0x0, &(0x7f0000000180)={0x0}) 03:37:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:17 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0xc800}}}}}}}}, 0x0) 03:37:17 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r5, r1, 0x0, 0x1000000201005) 03:37:17 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000006540)=[{{&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000080)="13ed", 0x2}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @private}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_retopts={{0x10}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff9}}], 0x28}}], 0x2, 0x0) 03:37:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) [ 1688.125166][ T3040] syz-executor.4[3040]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:17 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:17 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:17 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect(r0, 0x0, 0x0) 03:37:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogglEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdu5tJbeQqF1TOfzSab3nDlzc87MyW/mzunJCdBYA+WfItmR5Ick/UmOLD9gYOHjxvWLE39cvzhRZH7+xG9F+bX8fv3iROfQovrcXv5pJYOtpPVxkUdXqHf2/IV3xqenp85V+eG5M+8Oz56/8MLpM+Onpk5NnR059MrLYyOHRsfG1u1c37j0wYntbx459unk97/OXPrpq7K9O6qypeexXgYycPOaLPfseldWsweXpIveGhvCmvQkKburrx3//enJYuf155sfa20csKHmS1u7Fn84D2xiRepuAVCPzoO+fP/tbP/Wbw/qd+3owgtg2e83qm2hpDet6pi+Ze/362kgyeHLx74st2zQOAwAAABAk319NMnzK43/tfLQkuPK9MNJdid5JMmepD2v57Ekjyd5IsmTnflEa7D8+FvHf1pX7+rEuCPXjiaHq7ld/xz/64z+ZWdPlft/mUlfcfL09NSLSe5LMpi+rWV+ZJU6rnz713fdypaO/5VbWX9nLLBqx9XeZf+fnhyfG7+Xc2bRtY+SPb0r9X9xcyZQkeSpJHvvso6f9x441a3s9v3PRpr/Itm/YvwvzlwsVp+fOdy+Hwx37gq3+mRk9PVu9ev/epXxv231/t9ZLJ2vO7v2Oq7svvxqt7K7vf9vKd5qN3BLte/98bm5cyPJluL4rftH197mzapzPTrXq+z/wX0rP//vr75TXtB9SZ5O8kw1d3l/+9mfHEjyXJKDq9T552uH3u5WJv7rVfb/5Jrif+2Jw7s+P96t/juL/5fajRms9vj9d3t32kF1txMAAAAAAACA9dFqr4FXtIZuplutoaGFNfweyLbW9Mzs3MGTM++dnVxYK29n+lqdmV79S+aDjrTTi/nRZfmxJLuSfNbzv3Z+aGJmerLuk4eG294l/ku/9NTdOmDDWa8Vmkv8Q3OJf2gu8Q/NJf6hucQ/NJf4h+YS/9Bc4h+aS/xDI93Lun4SEhKbNVH3nQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgv+HvAAAA//+wE9y9") 03:37:17 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) [ 1688.468983][ T3059] syz-executor.4[3059]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:17 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x2}}}}}}}}}, 0x0) [ 1688.522741][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:18 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r5, r1, 0x0, 0x1000000201005) 03:37:18 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x5, 0x4) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xfffc}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000bc0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x20004080}, 0x40080) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x20000014) unshare(0x6c060000) 03:37:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:18 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3}}}}}}}}}, 0x0) 03:37:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:18 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x4}}}}}}}}}, 0x0) 03:37:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:18 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:18 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x5}}}}}}}}}, 0x0) [ 1689.075164][ T3085] syz-executor.4[3085]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:18 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x6}}}}}}}}}, 0x0) [ 1689.482123][ T3110] wg1 speed is unknown, defaulting to 1000 03:37:18 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r5, r1, 0x0, 0x1000000201005) 03:37:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000006c0)=0x3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000001c0)=0x1) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socket$inet(0x2, 0x3, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, 0x0, 0x4004810) r4 = creat(&(0x7f0000000500)='./file0\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) shutdown(r5, 0x1) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000840)=[{0x0}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x4}, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r5, 0x4004662b, &(0x7f0000000100)) creat(&(0x7f0000000280)='./bus\x00', 0x0) r6 = open(&(0x7f00000005c0)='./bus\x00', 0x5c3142, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs={0x1}, 0x6e) setrlimit(0x2, &(0x7f00000004c0)={0x0, 0x7e8}) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000140)={0x0, r4, 0xffffffffffffeffe, 0xfffffffffffffffd}) ppoll(0x0, 0x0, &(0x7f0000000680), 0x0, 0x0) 03:37:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:18 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:18 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x7}}}}}}}}}, 0x0) 03:37:18 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:18 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8}}}}}}}}}, 0x0) 03:37:18 executing program 2: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) [ 1690.016956][ T3122] syz-executor.4[3122]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1690.026150][ T3124] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQXxIX7tyYuHbFziULV65wqYn+AerKEIlBiTu9Zm7vpaX0Fi60jmE+n2R6z5kzN+fMnPxm7pyenAC1NVT+KZJtSX5IMpjk92bzg+sOGFr8uHrl3NSfV85NFWk2j/5WlF/LH1fOTXUOLdqfW8s/jWS4kTQ+LvLwKvXOnzn79uTs7Mzpdn504eQ7o/Nnzj534uTk8ZnjM6fGDrz04sTYgfGJiXU719fPv3906xuvHP50+vtf587/9FXZ3m3tsuXnsV6GMnTtmqz09HpXVrH7l6WL/gobQk/6kpTdNdCK/8H0ZanzBvPNj5U2DthQzdLmrsUfNoG7WJGqWwBUo/OgL99/O9u/9duD6l0+tPgCWPb71fa2WNKfRvuYgRXv9+tpKMnBC4e/LLds0DgMAAAAQJ19fSjJs6uN/zXywLLjyvSDSXYmeSjJrqQ1r+eRJI8meSzJ4535RD1YefyN4z+NS7d1YtySy4eSg+25XdeP/3VG/7K9r537f5nJQHHsxOzM80nuSTKcgc1lfmyNOi5++/d33cqWj/+VW1l/Zyyw3Y5L/Sv+Pz09uTB5J+fMkssfJbv6V+v/4tpMoCLJE0l232YdP+/ed7xb2c37n43U/CLZu2r8L81cLNaenznauh+Mdu4KN/pkbPy1bvXr/2qV8b9l7f7fXiyfrzvfex0Xd154uVvZ7d7/NxVvthq4qb3vvcmFhdNjyabiyI37x3tv892qcz0616vs/+E9qz//721/p7yge5I8meSp9tzlva1nf7IvyTNJ9q9R51+vHnirW5n4r1bZ/9M9xX/viYM7Pj/Srf5bi/8XWo0Zbu/x++/mbrWDqm4nAAAAAAAAAOuj0VoDr2iMXEs3GiMji2v43Zctjdm5+YX9x+bePTW9uFbe9gw0OjO9BpfNBx1rpZfy4yvyE0l2JPms73+t/MjU3Ox01ScPNbe1S/yXfumrunXAhrNeK9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q/1Jf6hvsQ/1Jf4h1q6k3X9JCQk7tZE1XcmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgP+GfwIAAP//bj3f7A==") 03:37:19 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xb}}}}}}}}}, 0x0) [ 1690.767820][ T3143] syz-executor.4[3143]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:19 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r5, r1, 0x0, 0x1000000201005) 03:37:19 executing program 2: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:19 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x10}}}}}}}}}, 0x0) 03:37:19 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x5411, &(0x7f0000000080)) 03:37:19 executing program 2: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQXxIX7tyYuHbFziULV65wqYn+AerKEIkhEuNGr5nbe2kpvYULrWOYzyeZ3nPmzM05Mye/mTunJydAbQ2Vf4pkW5Ifkgwm+bPZ/OC6A4YWP65eOTf1x5VzU0WazaO/FeXX8vuVc1OdQ4v259byTyMZbiSNj4s8vEq982fOvj05Oztzup0fXTj5zuj8mbPPnTg5eXzm+MypsQMvvTgxdmB8YmLdzvX18+8f3frGK4c/nf7+17nzP31Vtndbu2z5eayXoQxduyYrPb3elVXs/mXpor/ChtCTviRldw204n8wfVnqvMF882OljQM2VLO0uWvxh03gLlak6hYA1eg86Mv33872b/32oHqXDy2+AJb9frW9LZb0p9E+ZmDF+/16Gkpy8MLhL8stGzQOAwAAAFBnXx9K8uxq43+NPLDsuDL9YJKdSR5Ksitpzet5JMmjSR5L8nhnPlEPVh5/4/hP49JtnRi35PKh5GB7btf143+d0b9s72vn/l9mMlAcOzE783ySe5IMZ2BzmR9bo46L3/79Xbey5eN/5VbW3xkLbLfjUv+K/09PTy5M3sk5s+TyR8mu/tX6v7g2E6hI8kSS3bdZx8+79x3vVnbz/mcjNb9I9q4a/0szF4u152eOtu4Ho527wo0+GRt/rVv9+r9aZfxvWbv/txfL5+vO917HxZ0XXu5Wdrv3/03Fm60Gbmrve29yYeH0WLKpOHLj/vHe23y36lyPzvUq+394z+rP/3vb3ykv6J4kTyZ5qj13eW/r2Z/sS/JMkv1r1PnXqwfe6lYm/qtV9v90T/Hfe+Lgjs+PdKv/1uL/hVZjhtt7/P67uVvtoKrbCQAAAAAAAMD6aLTWwCsaI9fSjcbIyOIafvdlS2N2bn5h/7G5d09NL66Vtz0Djc5Mr8Fl80HHWuml/PiK/ESSHUk+6/tfKz8yNTc7XfXJQ81t7RL/pV/6qm4dsOGs1wr1Jf6hvsQ/1Jf4h/oS/1Bf4h/qS/xDfYl/qC/xD/Ul/qGW7mRdPwkJibs1UfWdCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOC/4Z8AAAD//1ct3/I=") 03:37:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x80) 03:37:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:19 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x2f}}}}}}}}}, 0x0) 03:37:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:19 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xc, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000040)={r2}, 0x8) [ 1690.984371][ T3158] syz-executor.4[3158]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1691.099169][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:20 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1000000201005) 03:37:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:20 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3c}}}}}}}}}, 0x0) 03:37:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:20 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x0, 0x0) getdents64(r0, &(0x7f0000000180)=""/151, 0x97) getdents64(r0, &(0x7f0000000400)=""/152, 0x98) 03:37:20 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:20 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x289}}}}}}}}}, 0x0) 03:37:20 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:20 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) getsockopt$nfc_llcp(r0, 0x118, 0x0, 0x0, 0x0) syz_clone(0x40102200, &(0x7f0000000000)="f2f7d6f367f2eae50f60c08879f2d98a2be9c0e2cdb96748e77eaba9fc8e59c47f0005361abfe945f1c1b77831c2795a3c0479a827c30534725c0f7d1268d08eab390bd50714ed98b67afb", 0x4b, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="cf81770ddc4297d224639c42779cc3efe5c05bb012b527fd4ff5c9edb1f32ce5c8983557eb1471deab3f5c1c392f670b519aa63631d3ac44e1e8d5543ca8f429b9ad54a691ed10c6edbc43368458449a667902d4204ae53a35ca226380b744988b7e45313b2da30f2a5b336fdc4079a00a4fcdf5d0176059c271256c16490b57c88b7d104516a70c0b6d428938776d5f3d4cb461a9fbbba8f002d3c01317fb35a915bb214c277cd16ada8815aa2dc086a8dc526aaa2f8643b6726c4a2db105e91750aebbaba075f2") 03:37:20 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x300}}}}}}}}}, 0x0) [ 1692.016067][ T3199] wg1 speed is unknown, defaulting to 1000 [ 1692.200308][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:21 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:21 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3e8}}}}}}}}}, 0x0) 03:37:21 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1000000201005) 03:37:21 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) getsockopt$nfc_llcp(r0, 0x118, 0x0, 0x0, 0x0) syz_clone(0x40102200, &(0x7f0000000000)="f2f7d6f367f2eae50f60c08879f2d98a2be9c0e2cdb96748e77eaba9fc8e59c47f0005361abfe945f1c1b77831c2795a3c0479a827c30534725c0f7d1268d08eab390bd50714ed98b67afb", 0x4b, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="cf81770ddc4297d224639c42779cc3efe5c05bb012b527fd4ff5c9edb1f32ce5c8983557eb1471deab3f5c1c392f670b519aa63631d3ac44e1e8d5543ca8f429b9ad54a691ed10c6edbc43368458449a667902d4204ae53a35ca226380b744988b7e45313b2da30f2a5b336fdc4079a00a4fcdf5d0176059c271256c16490b57c88b7d104516a70c0b6d428938776d5f3d4cb461a9fbbba8f002d3c01317fb35a915bb214c277cd16ada8815aa2dc086a8dc526aaa2f8643b6726c4a2db105e91750aebbaba075f2") 03:37:21 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:21 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x500}}}}}}}}}, 0x0) 03:37:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) [ 1692.837168][ T3212] __do_sys_memfd_create: 2 callbacks suppressed [ 1692.837194][ T3212] syz-executor.4[3212]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:21 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x543}}}}}}}}}, 0x0) 03:37:21 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) [ 1692.888885][ T3210] wg1 speed is unknown, defaulting to 1000 03:37:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) [ 1692.943526][ T3228] syz-executor.4[3228]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) [ 1693.103697][ T3235] syz-executor.4[3235]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:22 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x600}}}}}}}}}, 0x0) 03:37:22 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1000000201005) 03:37:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000000c0)) 03:37:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x755, &(0x7f0000000840)="$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") 03:37:22 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x608}}}}}}}}}, 0x0) [ 1693.780025][ T3246] syz-executor.4[3246]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1693.791902][ T3249] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1693.801748][ T3249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, 0x0, 0x0) 03:37:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) [ 1693.834743][ T3254] syz-executor.1[3254]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1693.853315][ T3259] syz-executor.4[3259]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1693.969583][ T3264] syz-executor.4[3264]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:22 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000000700), 0x0, 0x0) syz_io_uring_setup(0x49b8, &(0x7f0000000140)={0x0, 0x0, 0x402}, &(0x7f0000000000), &(0x7f00000001c0)) [ 1694.107592][ T3269] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 03:37:23 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000000700), 0x0, 0x0) syz_io_uring_setup(0x49b8, &(0x7f0000000140)={0x0, 0x0, 0x402}, &(0x7f0000000000), &(0x7f00000001c0)) 03:37:23 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x689}}}}}}}}}, 0x0) 03:37:23 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, 0x0, 0x0) 03:37:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:23 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x700}}}}}}}}}, 0x0) 03:37:23 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r5, r1, 0x0, 0x1000000201005) 03:37:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x0, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:23 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0xc020) 03:37:23 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x806}}}}}}}}}, 0x0) 03:37:23 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, 0x0, 0x0) [ 1694.708681][ T3278] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1694.712918][ T3274] syz-executor.4[3274]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/slabinfo\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 03:37:23 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x810}}}}}}}}}, 0x0) 03:37:23 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xb00}}}}}}}}}, 0x0) 03:37:23 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:37:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x0, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) read(r2, &(0x7f00000000c0)=""/14, 0xe) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) [ 1694.842816][ T3305] syz-executor.4[3305]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1694.947824][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x0, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xe80}}}}}}}}}, 0x0) 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:37:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r4, r1, 0x0, 0x1000000201005) 03:37:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) read(r2, &(0x7f00000000c0)=""/14, 0xe) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x1008}}}}}}}}}, 0x0) 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r3, r1, 0x0, 0x1000000201005) 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 1695.653887][ T3330] syz-executor.4[3330]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x2000}}}}}}}}}, 0x0) 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r3, r1, 0x0, 0x1000000201005) 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x2f00}}}}}}}}}, 0x0) 03:37:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) read(r2, &(0x7f00000000c0)=""/14, 0xe) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x2f89}}}}}}}}}, 0x0) 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3580}}}}}}}}}, 0x0) 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3c00}}}}}}}}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") [ 1696.059607][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) read(r2, &(0x7f00000000c0)=""/14, 0xe) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x4305}}}}}}}}}, 0x0) 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x4788}}}}}}}}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 03:37:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) pivot_root(&(0x7f0000000340)='./bus/../file0/file0\x00', &(0x7f0000000380)='./bus/../file0\x00') r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 03:37:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x3, 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0xfdef) read(r1, &(0x7f0000000040)=""/17, 0x11) read(r1, &(0x7f00000000c0)=""/14, 0xe) 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x4888}}}}}}}}}, 0x0) 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 03:37:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:24 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x6488}}}}}}}}}, 0x0) 03:37:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x20, r1, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 03:37:25 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x800e}}}}}}}}}, 0x0) 03:37:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@mss={0x3, 0x3}]}}}}}}}}, 0x0) 03:37:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:37:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:25 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1000000201005) 03:37:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x3, 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0xfdef) read(r1, &(0x7f0000000040)=""/17, 0x11) read(r1, &(0x7f00000000c0)=""/14, 0xe) 03:37:25 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8035}}}}}}}}}, 0x0) 03:37:25 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8100}}}}}}}}}, 0x0) 03:37:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:37:25 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1000000201005) 03:37:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3E1vFVUcB+Df3LaggBaML4hvFVSKaGtbEzTBRKKsZGMwcd20hRALNbQmQojRxIU7NyauXbFzycKVK1xqoh9AXRkiMUTiTmvm9l56Kb2FC61jmOdJ5uacOefmnJmT/8ydc08mQG0NlR9Fsi3JT0kGl7LXVxhK7kly9cq5qb+unJsqsrh49I+iWe/PK+em2lXb39tafjSS4UbS+LTIY6u0O3/m7HuTs7Mzp1v50YWT74/Onzn74omTk8dnjs+cGjvw6isTYwfGJybW7VjfOv/R0a1vv3748+kff587/8s3ZX+3tco6j2O9DGXo+nPZ4bn1bqxiD3Wki/4KO0JP+pKUwzXQjP/B9GV58Abz3c+Vdg7YUIulzV2LP14E7mJFqu4BUI32jb58/m1v/9VvD6p3+dDSA2A57ldb21JJfxqtOgMrnu/X01CSgxcOf11u2aB5GAAAAIA6+/ZQkhdWm/9r5OGOemX6kSQ7kzyaZFfSXNfzeJInkjyZ5Kn2eqIerKx/4/xP49JtHRi35PKh5GBrbdf183/t2b9s72vl7iszGSiOnZideSnJ/UmGM7C5zI+t0cbF7//5oVtZ5/xfuZXtt+cCW/241L/i/+npyYXJOzlmll3+JNnVv9r4F9dWAhVJnk6y+zbb+HX3vuPdym4+/mykxa+SvavG//LKxWLt9ZmjzevBaPuqcKPPxsbf7Na+8a9WGf9b1h7/7UXnet353tu4uPPCa93Kbvf6v6l4p9nBTa19H04uLJweSzYVR27cP957n+9W7fPRPl/l+A/vWf3+/0DrO+UJ3ZPkmSTPttYu723e+5N9SZ5Psn+NNv9+48C73crEf7XK8Z/uKf57Txzc8eWRbu3fWvy/3OzMcGuP3383d6sDVHU/AQAAAAAAAFgfjeY78IrGyLV0ozEysvQOvwezpTE7N7+w/9jcB6eml96Vtz0DjfZKr8GO9aBjzfRyfnxFfiLJjiRf9N3bzI9Mzc1OV33wUHNbu8R/6be+qnsHbDjva4X6Ev9QX+If6kv8Q32Jf6gv8Q/1Jf6hvsQ/1Jf4h/oS/1BLd/JePwkJibs1UfWVCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOD/4d8AAAD//wB53GY=") [ 1697.366082][ T3458] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:37:26 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8847}}}}}}}}}, 0x0) 03:37:26 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1000000201005) 03:37:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x3, 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0xfdef) read(r1, &(0x7f0000000040)=""/17, 0x11) read(r1, &(0x7f00000000c0)=""/14, 0xe) 03:37:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:26 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8848}}}}}}}}}, 0x0) 03:37:26 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r1, r0, 0x0, 0x1000000201005) 03:37:26 executing program 3: request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='!(+*\x00', 0xfffffffffffffffd) 03:37:26 executing program 2: socketpair(0x23, 0x0, 0xfffffff7, &(0x7f00000001c0)) 03:37:26 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8864}}}}}}}}}, 0x0) [ 1698.294440][ T3489] __do_sys_memfd_create: 12 callbacks suppressed [ 1698.294456][ T3489] syz-executor.4[3489]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) 03:37:26 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r1, r0, 0x0, 0x1000000201005) 03:37:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnDPn3Jwzc/KbuXPuyQSoraHyo0h2JPkxyeBS9uYKQ8kTSa5fuzD157ULU0UWF4//XjTr/XHtwlS7avt728uPRjLcSBqfFHl0lXbnz51/d3J2duZsKz+6cPq90flz5184dXry5MzJmTNjh155eWLs0PjExLod65sXPzy+/a3Xjn42/cNvcxd//rrs745WWedxrJehDN18Ljs8u96NVezBjnTRX2FH6ElfknK4BprxP5i+LA/eYL79qdLOARtqsbS1a/FHi8AmVqTqHgDVaN/oy+ff9vZv/fagelePLD0AluN+vbUtlfSn0aozsOL5fj0NJTl86ehX5ZYNmocBAAAAqLNvjiR5frX5v0Ye6qhXph9OsjvJI0n2JM11PY8leTxL64OebK8n6sHK+rfO/zSu3NWBcUeuHkkOt9Z23Tz/1579y86+Vu7/ZSYDxYlTszMvJrkvyXAGtpb5sTXauPzd3993K+uc/yu3sv32XGCrH1f6V/w/PT25MHkvx8yyqx8ne/pXG//ixkqgIslTSfbeZRu/7D1wslvZ7cefjbT4ZbJ/1fhfXrlYrL0+c7R5PRhtXxVu9enY+Bvd2jf+1Srjf9va47+z6FyvO997G5d3X3q1W9ndXv+3FG83O7ilte+DyYWFs2PJluLYrfvHe+/zZtU+H+3zVY7/8L7V7//3t75TntB9SZ5O8kxr7fL+5r0/OZDkuSQH12jzr9cPvdOtTPxXqxz/6Z7iv/fE4V1fHOvW/p3F/0vNzgy39vj9d3t3OkBV9xMAAAAAAACA9dFovgOvaIzcSDcaIyNL7/B7INsas3PzCwdPzL1/ZnrpXXk7M9Bor/Qa7FgPOtZML+fHV+QnkuxK8nnf/5r5kam52emqDx5qbnuX+C/92ld174AN532tUF/iH+pL/EN9iX+oL/EP9SX+ob7EP9SX+If6Ev9QX+Ifaule3usnISGxWRNVX5kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/hv+CQAA//+qItx8") 03:37:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000004c0)) [ 1698.411976][ T3508] syz-executor.4[3508]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1698.443667][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:27 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r1, r0, 0x0, 0x1000000201005) 03:37:27 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8902}}}}}}}}}, 0x0) 03:37:27 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x58) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) writev(r0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 03:37:27 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x7, &(0x7f00000000c0)=@framed={{}, [@initr0, @map_idx_val]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x90) 03:37:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:27 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8906}}}}}}}}}, 0x0) 03:37:27 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r0, 0x3c1e) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, r0) 03:37:27 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, 0x0) 03:37:27 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x892f}}}}}}}}}, 0x0) [ 1699.236682][ T3519] syz-executor.4[3519]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") [ 1699.323351][ T3536] syz-executor.4[3536]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:27 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='loginuid\x00') write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) 03:37:27 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:27 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xe803}}}}}}}}}, 0x0) 03:37:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x603, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 03:37:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:27 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) recvmmsg(r1, &(0x7f00000016c0)=[{{&(0x7f0000000000)=@l2, 0x0, &(0x7f0000001440)=[{&(0x7f0000000100)=""/240}, {&(0x7f0000000340)=""/4096}, {&(0x7f0000000200)=""/195, 0x52}, {&(0x7f0000001340)=""/127}, {&(0x7f00000013c0)=""/123}, {&(0x7f0000000080)=""/33}], 0x0, &(0x7f00000014c0)=""/4}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001500)=""/228}]}}], 0x6fde, 0x0, 0x0) 03:37:27 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x20000}}}}}}}}}, 0x0) 03:37:27 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:27 executing program 2: syz_emit_ethernet(0xe, &(0x7f00000000c0)={@link_local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@nop]}}}}}}}, 0x0) [ 1699.411859][ T3545] syz-executor.4[3545]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:27 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x1000000}}}}}}}}}, 0x0) [ 1699.512145][ T3561] syz-executor.4[3561]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:27 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSW(r0, 0x545c, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, "df56c32b26787d76291f9ced82b491bcb50707"}) 03:37:27 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:27 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x2000000}}}}}}}}}, 0x0) 03:37:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) [ 1699.555479][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 03:37:27 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) [ 1699.607135][ T3573] syz-executor.4[3573]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:28 executing program 3: sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) 03:37:28 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3000000}}}}}}}}}, 0x0) 03:37:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:28 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:28 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x4000000}}}}}}}}}, 0x0) [ 1699.770232][ T3589] syz-executor.4[3589]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:28 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000000c0)={{0x0, 0xe1}, 'port0\x00'}) 03:37:28 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:28 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x5000000}}}}}}}}}, 0x0) 03:37:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0xfdef) read(r1, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x3) 03:37:28 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x6000000}}}}}}}}}, 0x0) 03:37:28 executing program 2: socketpair(0x22, 0x0, 0x9, &(0x7f0000000000)) 03:37:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0xfdef) read(r1, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:28 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0xfdef) read(r1, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:28 executing program 3: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:De', 0x0) 03:37:28 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) [ 1700.540367][ T3605] syz-executor.4[3605]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1700.576409][ T3611] syz-executor.4[3611]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 03:37:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCNXCL(r0, 0x540a) 03:37:28 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x7000000}}}}}}}}}, 0x0) 03:37:28 executing program 3: syz_clone(0x2244000, 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfdef) read(0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M9vFVUcB9DPvLYQAS0YUcRfFVSKaGtbEzTBRKKsZGMwcd20hRALNbQmQojRxIU7NyauXbFzycKVK1xqon+AujJEYojEndbM63v0AX2FB61jOuck83rv3Hm5d+bmO/Pm9uYGqK2h8qNItiX5KcngUvbGA4aW/ly7en7qr6vnp4osLh77o0gjyZ9Xz0+1D21/b2v50UiGG0nj0yKPrVDv/Nlz703Ozs6caeVHF069Pzp/9tyLJ09Nnpg5MXN67OCrr0yMHRyfmFizc33rwkfHtr79+pHPp3/8fe7CL9+U7d3WKus8j7UylKEbr2WH59a6sort7EgX/RU2hJ70JSm7a6AZ/4Ppy3LnDea7nyttHLCuFkubuxZ/vAhsYEWqbgFQjfaDvnz/bW//1W8Pqnfl8NILYNnv11rbUkl/c3wnrXfDnetU/1CSQxePfF1uWadxGAAAAIA6+/ZwkhdWGv9r5OGO48r0I0l2JXk0ye6kOa/n8SRPJHkyyVPt+UQ9uPn4W8d/Gpfv6sS4I1cOJ4dac7tuHP9rj/5le18rd3+ZyUBx/OTszEtJHkgynIHNZX5slTouff/PD93KOsf/yq2svz0W2GrH5f6b/j89PbkweS/nzLIrnyS7+1fq/+L6TKAiydNJ9txlHb/u2X+iW9nt+5/1tPhVsm/F+F+euVisPj9ztHk/GG3fFW712dj4m93q1//VKuN/y+r9v73onK8733sdl3ZdfK1b2d3e/zcV7zQbuKm178PJhYUzY8mm4uit+8d7b/NG1b4e7etV9v/w3pWf/w+2vlNe0L1JnknybGvu8r7msz/Zn+T5JAdWqfPvNw6+261M/Fer7P/pnuK/98ShHV8e7Vb/ncX/y83GDLf2+P13e3faQVW3EwAAAAAAAIC10WiugVc0Rq6nG42RkaU1/B7Klsbs3PzCgeNzH5yeXlorb3sGGu2ZXoMd80HHmunl/PhN+YkkO5J80XdfMz8yNTc7XfXJQ81t7RL/pd/6qm4dsO6s1wr1Jf6hvsQ/1Jf4h/oS/1Bf4h/qS/xDfYl/qC/xD/Ul/qGW7mVdPwkJiY2aqPrOBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPD/8G8AAAD//55K3H8=") 03:37:28 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:28 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8000000}}}}}}}}}, 0x0) 03:37:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfdef) read(0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:28 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "4290258a0cd17d5a7a0eac255c2d558c3d7a8a56b8fc46834c6b2819e553797111ab74633b1272bbf442abf0fe896b230054bc8597e5162ecb9c7fdf71ad9893"}, 0x48, 0xfffffffffffffffb) 03:37:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:28 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0x15) 03:37:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfdef) read(0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:28 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:28 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8060000}}}}}}}}}, 0x0) 03:37:29 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b52, &(0x7f0000000140)) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8100000}}}}}}}}}, 0x0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f00000000c0)={@link_local={0x3}, @random="7f0a000300", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "0000b50800000000"}}}}}, 0x0) 03:37:29 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 2: syz_io_uring_setup(0x5756, &(0x7f0000000000), &(0x7f0000000080), 0x0) syz_io_uring_setup(0x3e11, &(0x7f0000000200), &(0x7f0000000280), 0x0) syz_io_uring_setup(0x7b72, &(0x7f0000000300), &(0x7f0000000380), 0x0) syz_io_uring_setup(0x79a5, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xb000000}}}}}}}}}, 0x0) 03:37:29 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) socket$packet(0x11, 0x3, 0x300) socket$inet_smc(0x2b, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x200000000000011, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$packet(r0, &(0x7f0000000440)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="4103092cc1f7480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x10000000}}}}}}}}}, 0x0) 03:37:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@random="0b68cdd6442c", @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x2a, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @loopback}}}}}}, 0x0) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x800, 0x0) close(r0) 03:37:29 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) connect$l2tp(r0, &(0x7f0000000000)={0xa, 0x0, @loopback, 0x0, 0x6000000}, 0x4f) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x20000000}}}}}}}}}, 0x0) 03:37:29 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "82cf7781058ca23cc8696288d0b12bdaba22923c0e6a7c4d175e000a645886b7ee061a35e55b44b31f37cdc148ad4ad301a10c41176138e2d4515527476dbb", 0x24}, 0x60) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x2f000000}}}}}}}}}, 0x0) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x40c5, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$eJzs3L9PE2EYwPGHUkpbAu1gNJoYnuiiywWqs7ExkBibSJAafyQmB1y16dmSXoOpMaKTq/GPcCCMbCTKP8DipouLG4uJgwzGml7vgEKhBiiH9vtJyD137/vcvS8c5HkvXNfvvX1ayDlGzqxIKKrSIyKyIZKUkPh6vG3IjSOy3Su5PPDj8/k79x/cSmcyY5Oq4+mpKylVHRr+8OxFzOu20i9ryUfr31Pf1k6vnV3/PfUk72je0WKpoqZOl75WzGnb0tm8UzBUJ2zLdCzNFx2r3GgvNdpzdmlurqpmcXYwPle2HEfNYlULVlUrJa2Uq2o+NvNFNQxDB+OCdrKLk5Nm+oDJM0c8GHRIuZw2e0UktqsluxjIgAAAQKB21v+hekl/dPX/0oXVysDd5SGv/l+JtKr/r35pnKup/o+KSMfr/90VUXc5VP2Pk2E4sutQT9Nevf6Pe7+/rtcPl0bcgPofAAAAAAAAAAAAAAAAAAAAAIB/wUatlqjVagl/63/1i0hURPz9oMeJzuDn3922XtwLD4nYb+az89nG1uuwKiK2WDIiCfnl3g+eeuy/eaR1SfloL3j5C/PZXrclnZO8mz8qCUnuzK/Vxm9mxka1oTm/T+Lb81OSkFOt81Mt8yNy6eK2fEMS8mlGSmLLrHtfb+W/HFW9cTuzIz/m9gMAAAAA4H9g6KaW63fD2Ku9kb+5vm75fKCxvh5puT4Py7lwsHMHAAAAAKBbONXnBdO2rfI+QUza9zl4EO7Qmf0Z/m2W/78MnZvpPoF/8aamqHcwgPG0DUJykKzh+mz0sFf3Hxvt1Ucmgvq2nHn3/ufRnfDacrTNTDsW9B3fXyAAAAAAx2Wr6PePXA92QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdKHj+DixoOcIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnBR/AgAA//9vPQ3+") 03:37:29 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3c000000}}}}}}}}}, 0x0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 2: r0 = syz_io_uring_setup(0x5a83, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/205, 0xcd}, {0x0}], &(0x7f0000000680)=[0x0, 0x8]}, 0x20) [ 1701.139042][ T27] audit: type=1400 audit(2000000249.335:143036): avc: denied { connect } for pid=3696 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x40000000}}}}}}}}}, 0x0) 03:37:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000002580)=[{{&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000400)=[{&(0x7f00000001c0)}, {&(0x7f0000000100)="d64d54281add6445fb6eac34d08df4bc6398972f605f220bdea3988d3ddb1a", 0x1f}, {&(0x7f00000002c0)="75a248d2334feb95f797e099faa64da65aa7a1cb055367a6e9bb78b5c75fa78742092bb43977639204b557b51f7ec35051571fd238aa07f2caabf4dde9d6970bbecc3939345bf27837f8216d6941623abcb7974b916263f9463fc190b669c600b1d53e4e0047467ad27572e0e565cafbeae7dde39e1bf4e94cb857e22a540bf76b887f9181339e8a46a36de93a1129789350a6aa883e53e22c8d34d4e72d9ecadea889413d6714df36429558197ca7a01f7f168d26f3d6a838b8748c6cd4a066a1dd538685c04eda135f3076befd77f889621030f1f544f23e4c00f1e5732df7a187ca613e8e95a3", 0xe8}, {&(0x7f00000003c0)="4076c2ad679cef8f2b5685e95fea", 0xe}], 0x4, &(0x7f0000000440)=[@ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @remote}}}], 0x38}}, {{&(0x7f0000000480)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000640)=[{&(0x7f00000004c0)="2919156a62e4dc3fe448f7a092b64212976787c7209e36ab3fb1fad15f77a7605786859cbf2ff4b9ebac9c932a91a8e8219627ae02d38eda4dde4be5e157df795a443ed57addd8f74f96b0ab486ef5f877", 0x51}, {&(0x7f0000000540)="64309684a28e70686ae79f7852d47636e1dc1d38a9d0627272d0f189016dcd47122c62c1e3a8dc83ae208fd7487025e731e0b0bb866d2cf17a95ec779ca3b4a10a801cc068ae68436bb113ba158767e8a8409d411be8918ee679d6970719197eb258409e08ef831e0582dc31b301c219832a35d3276d6c3489d411c354e93eee845a75915f5638d409767f538af16c5170c9c321632b976497436f1f00f8dbb3f88eceb30a64f73a26614482b1ea70501cbb11f2bb0300a19533af3b34baa29d1d791ce4703d8b25144721feeee5c447fe7ca033461a2829acd8c6a19807c1029107dc0665c5", 0xe6}], 0x2}}, {{&(0x7f0000000680)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001b40)=[{&(0x7f00000006c0)="9080cf460de234a6c1d17396f307b705781f3e80d895ea1b16e9eb549c6d0c7a2757f09dc9e1779cd88bb502e6bb3f9e3b152d0c1e17e033e3fefa6f90fde1050c47557aaf49706a41c22bda829fd41c6f", 0x51}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="4c923d97cc291664a5219c", 0x30af}, {0x0, 0xa000000}, {0x0}, {&(0x7f0000001a00)}], 0x6, &(0x7f0000001c00), 0x300}}, {{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001c40)="0fdb", 0x2}, {0x0}, {&(0x7f0000002000)}, {0x0}], 0x4}}], 0x4, 0x0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r1, r0, 0x0, 0x1000000201005) [ 1701.207807][ T3713] loop3: detected capacity change from 0 to 128 03:37:29 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x40c5, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$eJzs3L9PE2EYwPGHUkpbAu1gNJoYnuiiywWqs7ExkBibSJAafyQmB1y16dmSXoOpMaKTq/GPcCCMbCTKP8DipouLG4uJgwzGml7vgEKhBiiH9vtJyD137/vcvS8c5HkvXNfvvX1ayDlGzqxIKKrSIyKyIZKUkPh6vG3IjSOy3Su5PPDj8/k79x/cSmcyY5Oq4+mpKylVHRr+8OxFzOu20i9ryUfr31Pf1k6vnV3/PfUk72je0WKpoqZOl75WzGnb0tm8UzBUJ2zLdCzNFx2r3GgvNdpzdmlurqpmcXYwPle2HEfNYlULVlUrJa2Uq2o+NvNFNQxDB+OCdrKLk5Nm+oDJM0c8GHRIuZw2e0UktqsluxjIgAAAQKB21v+hekl/dPX/0oXVysDd5SGv/l+JtKr/r35pnKup/o+KSMfr/90VUXc5VP2Pk2E4sutQT9Nevf6Pe7+/rtcPl0bcgPofAAAAAAAAAAAAAAAAAAAAAIB/wUatlqjVagl/63/1i0hURPz9oMeJzuDn3922XtwLD4nYb+az89nG1uuwKiK2WDIiCfnl3g+eeuy/eaR1SfloL3j5C/PZXrclnZO8mz8qCUnuzK/Vxm9mxka1oTm/T+Lb81OSkFOt81Mt8yNy6eK2fEMS8mlGSmLLrHtfb+W/HFW9cTuzIz/m9gMAAAAA4H9g6KaW63fD2Ku9kb+5vm75fKCxvh5puT4Py7lwsHMHAAAAAKBbONXnBdO2rfI+QUza9zl4EO7Qmf0Z/m2W/78MnZvpPoF/8aamqHcwgPG0DUJykKzh+mz0sFf3Hxvt1Ucmgvq2nHn3/ufRnfDacrTNTDsW9B3fXyAAAAAAx2Wr6PePXA92QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdKHj+DixoOcIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnBR/AgAA//9vPQ3+") 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000697e"], 0x28}}, 0x0) 03:37:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x43050000}}}}}}}}}, 0x0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r1, r0, 0x0, 0x1000000201005) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x800e0000}}}}}}}}}, 0x0) 03:37:29 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x40c5, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$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") 03:37:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfdef) read(r0, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r1, r0, 0x0, 0x1000000201005) [ 1701.325067][ T3734] loop3: detected capacity change from 0 to 128 [ 1701.334495][ T3737] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1701.359676][ T3737] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:37:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(r1, 0x3305) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x80350000}}}}}}}}}, 0x0) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfdef) read(0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) [ 1701.416824][ T3747] loop3: detected capacity change from 0 to 128 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x81000000}}}}}}}}}, 0x0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfdef) read(0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8PsncnjPn3Jwzc/KbuXN6MgFqa6j8KJIdSX5MMriUvbnC0NKf69cuTP157cJUkcXF478Xzbp/XLsw1a7a/t728qORDDeSxidFHl2l3flz59+dnJ2dOdvKjy6cfm90/tz5F06dnjw5c3LmzNihV16eGDs0PjGxbsf65sUPj29/67Wjn03/8NvcxZ+/Lvu7o1XWeRzrZShDN5/LDs+ud2MVe7AjXfRX2BF60pekHK6BZvwPpi/LgzeYb3+qtHPAhlosbe1a/NEisIkVqboHQDXaN/ry+be9/Vu/Paje1SNLD4DluF9vbUsl/Wm06gyseL5fT0NJDl86+lW5ZYPmYQAAAADq7JsjSZ5fbf6vkYc66pXph5PsTvJIkj1Jc13PY0keT/JEkifb64l6sLL+rfM/jSt3dWDckatHksOttV03z/+1Z/+ys6+V+3+ZyUBx4tTszItJ7ksynIGtZX5sjTYuf/f3993KOuf/yq1svz0X2OrHlf4V/5+enlyYvJdjZtnVj5M9/auNf3FjJVCR5Kkke++yjV/2HjjZrez2489GWvwy2b9q/C+vXCzWXp852rwejLavCrf6dGz8jW7tG/9qlfG/be3x31l0rted772Ny7svvdqt7G6v/1uKt5sd3NLa98HkwsLZsWRLcezW/eO993mzap+P9vkqx3943+r3//tb3ylP6L4kTyd5prV2eX/z3p8cSPJckoNrtPnX64fe6VYm/qtVjv90T/Hfe+Lwri+OdWv/zuL/pWZnhlt7/P67vTsdoKr7CQAAAAAAAMD6aDTfgVc0Rm6kG42RkaV3+D2QbY3ZufmFgyfm3j8zvfSuvJ0ZaLRXeg12rAcda6aX8+Mr8hNJdiX5vO9/zfzI1NzsdNUHDzW3vUv8l37tq7p3wIbzvlaoL/EP9SX+ob7EP9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q+1dC/v9ZOQkNisiaqvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/Df8EAAD//2pK3Iw=") 03:37:29 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x40c5, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$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") 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x86ddffff}}}}}}}}}, 0x0) 03:37:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(r1, 0x3305) [ 1701.501551][ T3753] Restarting kernel threads ... done. [ 1701.507344][ T27] audit: type=1400 audit(2000000249.671:143037): avc: denied { ioctl } for pid=3750 comm="syz-executor.2" path="/dev/snapshot" dev="devtmpfs" ino=90 ioctlcmd=0x3305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x88470000}}}}}}}}}, 0x0) 03:37:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfdef) read(0xffffffffffffffff, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$eJzs3L9PE2EYwPGHUkpbAu1gNJoYnuiiywWqs7ExkBibSJAafyQmB1y16dmSXoOpMaKTq/GPcCCMbCTKP8DipouLG4uJgwzGml7vgEKhBiiH9vtJyD137/vcvS8c5HkvXNfvvX1ayDlGzqxIKKrSIyKyIZKUkPh6vG3IjSOy3Su5PPDj8/k79x/cSmcyY5Oq4+mpKylVHRr+8OxFzOu20i9ryUfr31Pf1k6vnV3/PfUk72je0WKpoqZOl75WzGnb0tm8UzBUJ2zLdCzNFx2r3GgvNdpzdmlurqpmcXYwPle2HEfNYlULVlUrJa2Uq2o+NvNFNQxDB+OCdrKLk5Nm+oDJM0c8GHRIuZw2e0UktqsluxjIgAAAQKB21v+hekl/dPX/0oXVysDd5SGv/l+JtKr/r35pnKup/o+KSMfr/90VUXc5VP2Pk2E4sutQT9Nevf6Pe7+/rtcPl0bcgPofAAAAAAAAAAAAAAAAAAAAAIB/wUatlqjVagl/63/1i0hURPz9oMeJzuDn3922XtwLD4nYb+az89nG1uuwKiK2WDIiCfnl3g+eeuy/eaR1SfloL3j5C/PZXrclnZO8mz8qCUnuzK/Vxm9mxka1oTm/T+Lb81OSkFOt81Mt8yNy6eK2fEMS8mlGSmLLrHtfb+W/HFW9cTuzIz/m9gMAAAAA4H9g6KaW63fD2Ku9kb+5vm75fKCxvh5puT4Py7lwsHMHAAAAAKBbONXnBdO2rfI+QUza9zl4EO7Qmf0Z/m2W/78MnZvpPoF/8aamqHcwgPG0DUJykKzh+mz0sFf3Hxvt1Ucmgvq2nHn3/ufRnfDacrTNTDsW9B3fXyAAAAAAx2Wr6PePXA92QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdKHj+DixoOcIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnBR/AgAA//9vPQ3+") [ 1701.564311][ T3770] loop3: detected capacity change from 0 to 128 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x3, 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0xfdef) read(r1, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x88480000}}}}}}}}}, 0x0) [ 1701.621817][ T3776] loop3: detected capacity change from 0 to 128 [ 1701.630232][ T3774] Restarting kernel threads ... done. 03:37:29 executing program 2: add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 03:37:29 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$eJzs3L9PE2EYwPGHUkpbAu1gNJoYnuiiywWqs7ExkBibSJAafyQmB1y16dmSXoOpMaKTq/GPcCCMbCTKP8DipouLG4uJgwzGml7vgEKhBiiH9vtJyD137/vcvS8c5HkvXNfvvX1ayDlGzqxIKKrSIyKyIZKUkPh6vG3IjSOy3Su5PPDj8/k79x/cSmcyY5Oq4+mpKylVHRr+8OxFzOu20i9ryUfr31Pf1k6vnV3/PfUk72je0WKpoqZOl75WzGnb0tm8UzBUJ2zLdCzNFx2r3GgvNdpzdmlurqpmcXYwPle2HEfNYlULVlUrJa2Uq2o+NvNFNQxDB+OCdrKLk5Nm+oDJM0c8GHRIuZw2e0UktqsluxjIgAAAQKB21v+hekl/dPX/0oXVysDd5SGv/l+JtKr/r35pnKup/o+KSMfr/90VUXc5VP2Pk2E4sutQT9Nevf6Pe7+/rtcPl0bcgPofAAAAAAAAAAAAAAAAAAAAAIB/wUatlqjVagl/63/1i0hURPz9oMeJzuDn3922XtwLD4nYb+az89nG1uuwKiK2WDIiCfnl3g+eeuy/eaR1SfloL3j5C/PZXrclnZO8mz8qCUnuzK/Vxm9mxka1oTm/T+Lb81OSkFOt81Mt8yNy6eK2fEMS8mlGSmLLrHtfb+W/HFW9cTuzIz/m9gMAAAAA4H9g6KaW63fD2Ku9kb+5vm75fKCxvh5puT4Py7lwsHMHAAAAAKBbONXnBdO2rfI+QUza9zl4EO7Qmf0Z/m2W/78MnZvpPoF/8aamqHcwgPG0DUJykKzh+mz0sFf3Hxvt1Ucmgvq2nHn3/ufRnfDacrTNTDsW9B3fXyAAAAAAx2Wr6PePXA92QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdKHj+DixoOcIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnBR/AgAA//9vPQ3+") 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x88640000}}}}}}}}}, 0x0) 03:37:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000ad96f6e0fdaf4f1275087146bf7efdf9c7dc286513bc83c0c3215c2f6c305fc4af04523b16b16e281ad5557157a6d3429384a3a9c153b422576773675dc856cb523adab8438d4071ce881fcacf0358f51b95f31100591e551f1aafc0718d5572cb2e3477c2a93120d68d5279a7f88552830950dd83ca73ca46712fe3ce8dae22a86451b9d81acb195c5dffaa91a5b61664e48774e63a8f7e1761d90e0f5e213c38803cd989ba42c2899ad5549e59aa49ebee7df668aea9b00a7dd2f85c", @ANYRES32=0x0], &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @private=0xa010100}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x4}, @in6={0xa, 0x4e21, 0x8000, @mcast1, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0xfffffefd) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r7 = socket(0xa, 0x1, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r7, 0x84, 0x77, &(0x7f0000000080)={r9}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) 03:37:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x3, 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0xfdef) read(r1, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:29 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x88a8ffff}}}}}}}}}, 0x0) 03:37:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x3, 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0xfdef) read(r1, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0x3f0) [ 1701.766344][ T3801] loop3: detected capacity change from 0 to 128 03:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yooFtHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmftCL6W3UGgd0/l8krk95565OWfm5Df3zukvE6C2hsqXItmR5Mckg63qzTsMtf5cv3Zh6s9rF6aKLC4e/73IM0n+uHZhqrNr53Pby5dGMtxIGp8UeXSFfufPnX93cnZ25my7Prpw+r3R+XPnXzh1evLkzMmZM2OHXnl5YuzQ+MTEuh3rmxc/PL79rdeOfjb9w29zF3/+uhzvjnZb93Gsl6EM3Xwuu+xf784q9mBXueivcCCsSV+ScroGmvE/mL4sTd5gvv2p0sEBG2qxtLVn80eLwCZWpOoRANXofNGX97+d7d/67UH1rh5p3QCW8369vbVa+tNo7zOw7P5+PQ0lOXzp6Ffllg1ahwEAAACos2+OJHl+pfW/Rh7q2q8sP5xkd5JHkuxJmnk9jyV5PMkTSZ7s5BOtwfL9b13/aVy5qwPjjlw9khxu53bdvP7XWf3Lzr527f9lJQPFiVOzMy8muS/JcAa2lvWxVfq4/N3f3/dq617/K7ey/85aYHscV/qX/X96enJh8l6OmSVXP0729K80/8WNTKAiyVNJ9t5lH7/sPXCyV9vt55+NtPhl8uyK8b+UuVisnp852rwejHauCrf6dGz8jV79m/9qlfG/bfX531l05+vOr72Py7svvdqr7W6v/1uKt5sD3NJ+74PJhYWzY8mW4tit74+vfcybVed8dM5XOf/D+1b+/r+//ZnyhO5L8nTSzPnen9Y1YzjJgSTPJTm4Sp9/vX7onV5t4r9a5fxPryn+1144vOuLY736v7P4f6k5mOH2O37/3d6dTlDV4wQAAAAAAABgfTSaz8ArGiM3yo3GyEjrGX4PZFtjdm5+4eCJuffPTLeelbczA41OptdgVz7oWLO8VB9fVp9IsivJ533/a9ZHpuZmp6s+eKi57T3iv/RrX9WjAzac57VCfYl/qC/xD/Ul/qG+xD/Ul/iH+hL/UF/iH+pL/EN9iX+opXt5rp+CgsJmLVR9ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4b/gnAAD//xJK3KI=") 03:37:29 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$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") 03:37:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:30 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x88caffff}}}}}}}}}, 0x0) [ 1701.817709][ T3805] loop2: detected capacity change from 0 to 2048 03:37:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") [ 1701.866979][ T3805] loop2: p1 p2 p3 [ 1701.881736][ T3815] loop3: detected capacity change from 0 to 128 [ 1701.951691][ T2776] loop2: p1 p2 p3 03:37:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:30 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:30 executing program 3: open(0x0, 0x40c5, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$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") 03:37:30 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x88f7ffff}}}}}}}}}, 0x0) 03:37:30 executing program 2: unshare(0x48000600) 03:37:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:30 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x88fbffff}}}}}}}}}, 0x0) 03:37:30 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) 03:37:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:30 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1000000201005) [ 1702.712996][ T3833] loop3: detected capacity change from 0 to 128 03:37:30 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x89020000}}}}}}}}}, 0x0) 03:37:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:30 executing program 3: open(0x0, 0x40c5, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$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") 03:37:30 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1000000201005) [ 1702.789506][ T3844] wg1 speed is unknown, defaulting to 1000 [ 1702.846725][ T3854] loop3: detected capacity change from 0 to 128 03:37:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x89060000}}}}}}}}}, 0x0) 03:37:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1000000201005) 03:37:31 executing program 3: open(0x0, 0x40c5, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$eJzs3L9PE2EYwPGHUkpbAu1gNJoYnuiiywWqs7ExkBibSJAafyQmB1y16dmSXoOpMaKTq/GPcCCMbCTKP8DipouLG4uJgwzGml7vgEKhBiiH9vtJyD137/vcvS8c5HkvXNfvvX1ayDlGzqxIKKrSIyKyIZKUkPh6vG3IjSOy3Su5PPDj8/k79x/cSmcyY5Oq4+mpKylVHRr+8OxFzOu20i9ryUfr31Pf1k6vnV3/PfUk72je0WKpoqZOl75WzGnb0tm8UzBUJ2zLdCzNFx2r3GgvNdpzdmlurqpmcXYwPle2HEfNYlULVlUrJa2Uq2o+NvNFNQxDB+OCdrKLk5Nm+oDJM0c8GHRIuZw2e0UktqsluxjIgAAAQKB21v+hekl/dPX/0oXVysDd5SGv/l+JtKr/r35pnKup/o+KSMfr/90VUXc5VP2Pk2E4sutQT9Nevf6Pe7+/rtcPl0bcgPofAAAAAAAAAAAAAAAAAAAAAIB/wUatlqjVagl/63/1i0hURPz9oMeJzuDn3922XtwLD4nYb+az89nG1uuwKiK2WDIiCfnl3g+eeuy/eaR1SfloL3j5C/PZXrclnZO8mz8qCUnuzK/Vxm9mxka1oTm/T+Lb81OSkFOt81Mt8yNy6eK2fEMS8mlGSmLLrHtfb+W/HFW9cTuzIz/m9gMAAAAA4H9g6KaW63fD2Ku9kb+5vm75fKCxvh5puT4Py7lwsHMHAAAAAKBbONXnBdO2rfI+QUza9zl4EO7Qmf0Z/m2W/78MnZvpPoF/8aamqHcwgPG0DUJykKzh+mz0sFf3Hxvt1Ucmgvq2nHn3/ufRnfDacrTNTDsW9B3fXyAAAAAAx2Wr6PePXA92QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdKHj+DixoOcIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnBR/AgAA//9vPQ3+") 03:37:31 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e4, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) 03:37:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:31 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$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") 03:37:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1000000201005) 03:37:31 executing program 2: socketpair(0x0, 0xe, 0x0, &(0x7f0000000540)) 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x892f0000}}}}}}}}}, 0x0) [ 1702.947788][ T3861] loop3: detected capacity change from 0 to 128 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8dffffff}}}}}}}}}, 0x0) 03:37:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1000000201005) 03:37:31 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$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") [ 1703.014272][ T3872] loop3: detected capacity change from 0 to 128 03:37:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:31 executing program 2: semop(0x0, &(0x7f00000000c0)=[{}], 0x1f4) 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xe8030000}}}}}}}}}, 0x0) 03:37:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1000000201005) 03:37:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xf5ffffff}}}}}}}}}, 0x0) 03:37:31 executing program 2: getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="01ea050095"], 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r1}, 0x8) 03:37:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1000000201005) 03:37:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") [ 1703.150723][ T3889] loop3: detected capacity change from 0 to 128 03:37:31 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x1, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES8], 0x1, 0x2cd, &(0x7f00000007c0)="$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") 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xffffa888}}}}}}}}}, 0x0) 03:37:31 executing program 2: r0 = syz_io_uring_setup(0x4d2c, &(0x7f0000000040), &(0x7f0000000000), &(0x7f00000001c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000), 0x27) 03:37:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x0) 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xffffca88}}}}}}}}}, 0x0) 03:37:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xffffdd86}}}}}}}}}, 0x0) 03:37:31 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x1, 0x0, 0x0, 0x2}}, 0x2e) 03:37:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x0) [ 1703.278392][ T3916] loop3: detected capacity change from 0 to 128 03:37:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}}, 0x0) 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xfffff788}}}}}}}}}, 0x0) 03:37:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$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") 03:37:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ec0)=[{{&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@hopopts_2292={{0x18, 0x29, 0x4, {0x0, 0x0, '\x00', [@padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0]}, @jumbo, @jumbo, @padn, @enc_lim, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0]}}]}}}], 0x18}}], 0x4000000000002d6, 0x200d8080) 03:37:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) sendfile(r2, r1, 0x0, 0x0) 03:37:31 executing program 3: mlock(&(0x7f0000800000/0x800000)=nil, 0x800000) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 03:37:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x7, 0x0, 0x0, 0x100}, 0x48) 03:37:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) write$binfmt_script(r3, 0x0, 0xfdef) read(r2, &(0x7f0000000040)=""/17, 0x11) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x3f0) 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xfffffb88}}}}}}}}}, 0x0) 03:37:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000004c0), 0x1, 0x413, &(0x7f0000000500)="$eJzs3M1vFVUfB/Dv3LaQB3gsGF8Q3yqoFNHWtiZogolEWcnGYOK6aQshFmpoTYQQo4kLd25MXLti55KFK1e41ET/AHVliMQQiTutmdt76aX0Fi60jul8Psn0njNnmnNmTn4zd849OQFqa6j8UyQ7kvyYZHApe/MBQ0sf169dmPrz2oWpIouLx38vmsf9ce3CVPvQRutzeysz3EganxR5dJV658+df3dydnbmbCs/unD6vdH5c+dfOHV68uTMyZkzY4deeXli7ND4xMS6neubFz88vv2t145+Nv3Db3MXf/66bP+OVlnneayXoQzdfC07PLvelVXswY500V9hQ+hJX5Kyuwaa8T+Yvix33mC+/anSxgEbarG0tWvxR4vAJlak6hYA1Wg/6Mv33/b2b333oHpXjyy9AJb9fr21LZX03xjPGVjxfr+ehpIcvnT0q3LLBo3DAAAAANTZN0eSPL/a+F8jD3UcV6YfTrI7ySNJ9iTNeT2PJXk8yRNJnmzPJ+rByuNvHf9pXLmrE+OOXD2SHG7N7bp5/K89+pedfa3c/8tMBooTp2ZnXkxyX5LhDGwt82Nr1HH5u7+/71bWOf5XbmX97bHAVjuu9K/4fXp6cmHyXs6ZZVc/Tvb0r9b/xY2ZQEWSp5Lsvcs6ftl74GS3stv3Pxtp8ctk/6rxvzxzsVh7fuZo834w2r4r3OrTsfE3utWv/6tVxv+2tft/Z9E5X3e+9zou7770areyu73/bynebjZwS2vfB5MLC2fHki3FsVv3j/fe5s2qfT3a16vs/+F9qz//72/9T3lB9yV5OskzrbnL+5vP/uRAkueSHFyjzr9eP/ROtzLxX62y/6d7iv/eE4d3fXGsW/13Fv8vNRsz3Nrj+9/t3WkHVd1OAAAAAAAAANZHo7kGXtEYuZFuNEZGltbweyDbGrNz8wsHT8y9f2Z6aa28nRlotGd6DXbMBx1rppfz4yvyE0l2Jfm873/N/MjU3Ox01ScPNbe9S/yXfu2runXAhrNeK9SX+If6Ev9QX+If6kv8Q32Jf6gv8Q/1Jf6hvsQ/1Jf4h1q6l3X9JCQkNmui6jsTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwH/DPwEAAP//njrcfw==") 03:37:31 executing program 2: r0 = socket(0x28, 0x5, 0x0) bind(r0, &(0x7f0000000040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}}, 0x80) 03:37:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x1, &(0x7f0000000840)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0xa, 0x2}, 0x8, 0x10, 0x0}, 0x90) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000280)=@base={0xa, 0x1, 0x8000, 0x3f, 0x0, 0x1, 0x1800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xb80300}, 0x48) 03:37:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "00ad00", 0x44, 0x2f, 0x0, @private0, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83c}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xffffff7f}}}}}}}}}, 0x0) [ 1703.665081][ T3968] __do_sys_memfd_create: 41 callbacks suppressed [ 1703.665099][ T3968] syz-executor.4[3968]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1703.759222][ T3978] syz-executor.4[3978]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1703.807173][ T3981] wg1 speed is unknown, defaulting to 1000 [ 1703.843716][ T3987] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 1704.223879][ T4000] syz-executor.4[4000]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1704.239000][ T4003] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1704.305466][ T4010] syz-executor.4[4010]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1704.338566][ T4008] wg1 speed is unknown, defaulting to 1000 [ 1704.369524][ T4020] syz-executor.4[4020]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1704.393855][ T4017] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 1704.490659][ T4033] syz-executor.4[4033]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1704.578470][ T4044] syz-executor.4[4044]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1704.594597][ T4043] wg1 speed is unknown, defaulting to 1000 [ 1704.660684][ T4053] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 1705.371212][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1705.419086][ T4066] syz-executor.4[4066]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1705.447448][ T4060] wg1 speed is unknown, defaulting to 1000 [ 1705.489883][ T4075] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 1705.561041][ T4080] syz-executor.4[4080]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1705.637181][ T4087] syz-executor.4[4087]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1706.362205][ T4100] wg1 speed is unknown, defaulting to 1000 [ 1706.388920][ T4104] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 1706.482969][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1706.615110][ T4124] loop2: detected capacity change from 0 to 512 [ 1706.624331][ T4124] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 1706.636690][ T4124] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 1706.687648][ T9817] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1709.072458][ T4198] __do_sys_memfd_create: 14 callbacks suppressed [ 1709.072476][ T4198] syz-executor.4[4198]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1709.128362][ T4206] syz-executor.4[4206]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1709.184197][ T4217] syz-executor.4[4217]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1709.977786][ T4224] syz-executor.4[4224]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1710.047050][ T4236] syz-executor.4[4236]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1710.883061][ T4247] syz-executor.4[4247]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1710.924972][ T4256] syz-executor.4[4256]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1710.969668][ T4264] syz-executor.4[4264]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1711.796574][ T4279] syz-executor.4[4279]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1711.853235][ T4287] syz-executor.4[4287]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1714.524018][ T4367] __do_sys_memfd_create: 11 callbacks suppressed [ 1714.524036][ T4367] syz-executor.4[4367]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1714.577403][ T4374] syz-executor.4[4374]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1714.613178][ T4380] syz-executor.4[4380]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1714.661867][ T4387] syz-executor.4[4387]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1715.426514][ T4396] syz-executor.4[4396]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1715.468652][ T4402] syz-executor.4[4402]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1715.501369][ T4406] syz-executor.4[4406]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1715.544663][ T4412] syz-executor.4[4412]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1715.584441][ T4418] syz-executor.4[4418]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1715.627491][ T4424] syz-executor.4[4424]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1719.887406][ T5068] __do_sys_memfd_create: 132 callbacks suppressed [ 1719.887423][ T5068] syz-executor.4[5068]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1719.936435][ T5074] syz-executor.4[5074]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1719.971523][ T5080] syz-executor.4[5080]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1720.022182][ T5086] syz-executor.4[5086]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1720.058935][ T5092] syz-executor.4[5092]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1720.102928][ T5097] syz-executor.4[5097]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1720.139573][ T5102] syz-executor.4[5102]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1720.173221][ T5107] syz-executor.4[5107]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1720.217715][ T5114] syz-executor.4[5114]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1720.259742][ T5120] syz-executor.4[5120]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1723.697307][ T5658] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1723.721181][ T5658] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1724.602270][ T5685] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1724.669416][ T5695] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1724.678881][ T5694] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1725.262450][ T5799] __do_sys_memfd_create: 135 callbacks suppressed [ 1725.262465][ T5799] syz-executor.4[5799]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1725.303058][ T5805] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1725.317768][ T5807] syz-executor.4[5807]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1725.353512][ T5809] syz-executor.4[5809]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1725.367847][ T5811] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1725.399093][ T5814] syz-executor.4[5814]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1725.411234][ T5816] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1725.434196][ T5820] syz-executor.4[5820]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1725.444004][ T5818] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1725.484178][ T5825] syz-executor.4[5825]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1725.521467][ T5830] syz-executor.4[5830]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1725.572883][ T5835] syz-executor.4[5835]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1725.583523][ T5837] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1725.614782][ T5839] syz-executor.4[5839]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1725.654421][ T5846] syz-executor.4[5846]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.619984][ T6259] __do_sys_memfd_create: 130 callbacks suppressed [ 1730.620003][ T6259] syz-executor.4[6259]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.673406][ T6269] syz-executor.4[6269]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.721682][ T6275] syz-executor.4[6275]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.746223][ T6279] __nla_validate_parse: 1 callbacks suppressed [ 1730.746239][ T6279] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1730.770220][ T6281] syz-executor.4[6281]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.797289][ T6283] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1730.812229][ T6285] syz-executor.4[6285]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.815495][ T6286] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1730.849251][ T6290] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1730.852405][ T6292] syz-executor.4[6292]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.893458][ T6296] syz-executor.4[6296]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.925149][ T6301] syz-executor.4[6301]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.958960][ T6308] syz-executor.4[6308]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1730.999450][ T6316] syz-executor.4[6316]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1731.031378][ T6318] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1731.053336][ T6318] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1731.085675][ T6324] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1731.101786][ T6324] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1731.134258][ T6333] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1731.589763][ T6404] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1735.985985][ T6848] __do_sys_memfd_create: 155 callbacks suppressed [ 1735.986012][ T6848] syz-executor.4[6848]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1736.085235][ T6850] syz-executor.4[6850]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1736.165905][ T6852] syz-executor.4[6852]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1736.238860][ T6854] syz-executor.4[6854]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1736.274076][ T6856] syz-executor.4[6856]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1736.304920][ T6858] syz-executor.4[6858]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1736.336422][ T6860] syz-executor.4[6860]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1736.373879][ T6862] syz-executor.4[6862]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1736.407258][ T6864] syz-executor.4[6864]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1736.439120][ T6866] syz-executor.4[6866]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1737.869294][ T6966] __nla_validate_parse: 9 callbacks suppressed [ 1737.869310][ T6966] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1737.910048][ T6970] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1737.958432][ T6977] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1738.078219][ T6999] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1738.123918][ T7004] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1738.161773][ T7010] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1738.381141][ T7062] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1738.417849][ T7068] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1738.452343][ T7075] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1738.468892][ T7077] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1772.422821][ C1] EXT4-fs (loop4): error count since last fsck: 2 [ 1772.429317][ C1] EXT4-fs (loop4): initial error at time 2000000013: ext4_validate_block_bitmap:439 [ 1772.438743][ C1] EXT4-fs (loop4): last error at time 2000000013: ext4_mb_clear_bb:6627 [ 1908.018409][T20070] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1908.374898][T14865] tipc: Disabling bearer [ 1908.380198][T14865] tipc: Disabling bearer [ 1908.389212][T14865] tipc: Left network mode [ 1909.062980][T14865] hsr_slave_0: left promiscuous mode [ 1909.068636][T14865] hsr_slave_1: left promiscuous mode [ 1909.074341][T14865] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1909.082248][T14865] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1909.089802][T14865] team0: left allmulticast mode [ 1909.094717][T14865] team_slave_0: left allmulticast mode [ 1909.100213][T14865] team_slave_1: left allmulticast mode [ 1909.105717][T14865] team0: left promiscuous mode [ 1909.110488][T14865] team_slave_0: left promiscuous mode [ 1909.115949][T14865] team_slave_1: left promiscuous mode [ 1909.121581][T14865] bridge0: port 3(team0) entered disabled state [ 1909.128828][T14865] bridge_slave_1: left allmulticast mode [ 1909.134527][T14865] bridge_slave_1: left promiscuous mode [ 1909.140193][T14865] bridge0: port 2(bridge_slave_1) entered disabled state [ 1909.147885][T14865] bridge_slave_0: left allmulticast mode [ 1909.153517][T14865] bridge_slave_0: left promiscuous mode [ 1909.159153][T14865] bridge0: port 1(bridge_slave_0) entered disabled state [ 1909.209147][T11548] SELinux: failure in sel_netif_sid_slow(), invalid network interface (13) [ 1909.218299][T11548] SELinux: failure in sel_netif_sid_slow(), invalid network interface (156) [ 1909.227147][T11548] SELinux: failure in sel_netif_sid_slow(), invalid network interface (159) [ 1909.236864][T11548] SELinux: failure in sel_netif_sid_slow(), invalid network interface (160) [ 1909.328099][T14865] bond3 (unregistering): (slave bridge18): Releasing active interface [ 1909.393729][T14865] bond3 (unregistering): (slave bridge17): Releasing active interface [ 1909.469041][T14865] bond3 (unregistering): Released all slaves [ 1909.477998][T14865] bond0 (unregistering): (slave bridge16): Releasing active interface [ 1909.531435][T14865] bond0 (unregistering): Released all slaves [ 1909.647311][T11548] SELinux: failure in sel_netif_sid_slow(), invalid network interface (13) [ 1910.270591][T14865] bond2 (unregistering): Released all slaves [ 1910.282554][T14865] bond1 (unregistering): Released all slaves [ 1910.395693][T14865] team0 (unregistering): Port device team_slave_1 removed [ 1910.405541][T14865] team0 (unregistering): Port device team_slave_0 removed [ 1910.416082][T14865] 1ªX (unregistering): (slave bond_slave_1): Releasing backup interface [ 1910.427605][T14865] 1ªX (unregistering): (slave bond_slave_0): Releasing backup interface [ 1910.465206][T14865] 1ªX (unregistering): Released all slaves [ 1910.988644][T14865] IPVS: stop unused estimator thread 0... [ 1911.295400][T14865] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.360794][T14865] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.414098][T14865] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.458333][T14865] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.543492][T14865] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.609396][T14865] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.673146][T14865] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.735625][T14865] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.820089][T14865] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.874813][T14865] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1911.938821][T14865] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1912.005378][T14865] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1912.331555][T14865] tipc: Left network mode [ 1912.336100][T14865] tipc: Left network mode [ 1912.400465][T14865] batman_adv: batadv0: Removing interface: macvtap2 [ 1912.410517][T14865] bond5: (slave ip6gre1): Releasing backup interface [ 1912.417255][T14865] ip6gre1 (unregistering): left promiscuous mode [ 1912.425026][T14865] bond5: Destroying bond [ 1912.450791][T14865] bond5 (unregistering): Released all slaves [ 1913.122173][T14865] dvmrp1 (unregistering): left allmulticast mode [ 1913.140716][T14865] dvmrp0 (unregistering): left allmulticast mode [ 1913.246217][T14865] hsr_slave_0: left promiscuous mode [ 1913.252065][T14865] hsr_slave_1: left promiscuous mode [ 1913.257685][T14865] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1913.265806][T14865] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1913.276773][T14865] hsr_slave_0: left promiscuous mode [ 1913.282775][T14865] hsr_slave_1: left promiscuous mode [ 1913.288430][T14865] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1913.295863][T14865] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1913.304028][T14865] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1913.311445][T14865] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1913.319238][T14865] bridge_slave_1: left allmulticast mode [ 1913.324898][T14865] bridge_slave_1: left promiscuous mode [ 1913.330622][T14865] bridge0: port 2(bridge_slave_1) entered disabled state [ 1913.338381][T14865] bridge_slave_0: left allmulticast mode [ 1913.344017][T14865] bridge_slave_0: left promiscuous mode [ 1913.349831][T14865] bridge0: port 1(bridge_slave_0) entered disabled state [ 1913.364917][T14865] hsr_slave_0: left promiscuous mode [ 1913.370807][T14865] hsr_slave_1: left promiscuous mode [ 1913.376413][T14865] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1913.383865][T14865] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1913.391619][T14865] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1913.399006][T14865] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1913.406750][T14865] batman_adv: batadv0: Removing interface: macvtap3 [ 1913.413877][T14865] bridge_slave_0: left allmulticast mode [ 1913.419543][T14865] bridge_slave_0: left promiscuous mode [ 1913.425193][T14865] bridge0: port 1(bridge_slave_0) entered disabled state [ 1913.454849][T14865] hsr_slave_0: left promiscuous mode [ 1913.460473][T14865] hsr_slave_1: left promiscuous mode [ 1913.466185][T14865] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1913.473625][T14865] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1913.481279][T14865] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1913.488827][T14865] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1913.502541][T14865] hsr_slave_0: left promiscuous mode [ 1913.509834][T14865] hsr_slave_1: left promiscuous mode [ 1913.515532][T14865] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1913.523354][T14865] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1913.531205][T14865] team0: left allmulticast mode [ 1913.536134][T14865] team_slave_0: left allmulticast mode [ 1913.541685][T14865] team_slave_1: left allmulticast mode [ 1913.547145][T14865] team0: left promiscuous mode [ 1913.552071][T14865] team_slave_0: left promiscuous mode [ 1913.557520][T14865] team_slave_1: left promiscuous mode [ 1913.563055][T14865] bridge0: port 3(team0) entered disabled state [ 1913.569977][T14865] bridge_slave_1: left allmulticast mode [ 1913.575659][T14865] bridge_slave_1: left promiscuous mode [ 1913.581265][T14865] bridge0: port 2(bridge_slave_1) entered disabled state [ 1913.588765][T14865] bridge_slave_0: left allmulticast mode [ 1913.594467][T14865] bridge_slave_0: left promiscuous mode [ 1913.600135][T14865] bridge0: port 1(bridge_slave_0) entered disabled state [ 1913.620710][T14865] veth1_macvtap: left promiscuous mode [ 1913.626233][T14865] veth0_macvtap: left promiscuous mode [ 1913.631724][T14865] veth1_vlan: left promiscuous mode [ 1913.637017][T14865] veth0_vlan: left promiscuous mode [ 1913.643510][T14865] veth1_macvtap: left promiscuous mode [ 1913.649042][T14865] veth0_macvtap: left promiscuous mode [ 1913.654515][T14865] veth1_vlan: left promiscuous mode [ 1913.659833][T14865] veth0_vlan: left promiscuous mode [ 1913.667158][T14865] veth1_macvtap: left promiscuous mode [ 1913.672636][T14865] veth0_macvtap: left promiscuous mode [ 1913.678370][T14865] veth1_vlan: left promiscuous mode [ 1913.725198][T14865] infiniband syz1: set down [ 1914.019831][ T1709] SELinux: failure in sel_netif_sid_slow(), invalid network interface (122) [ 1914.053405][T14865] bond6 (unregistering): Released all slaves [ 1914.062217][T14865] bond5 (unregistering): Released all slaves [ 1914.071678][T14865] bond4 (unregistering): Released all slaves [ 1914.080202][T14865] bond3 (unregistering): Released all slaves [ 1914.088924][T14865] bond2 (unregistering): Released all slaves [ 1914.097479][T14865] bond1 (unregistering): (slave veth13): Releasing backup interface [ 1914.105941][T14865] veth13 (unregistering): left promiscuous mode [ 1914.115494][T14865] bond1 (unregistering): Released all slaves [ 1914.545554][T14865] team_slave_1 (unregistering): left promiscuous mode [ 1914.552758][T14865] team0 (unregistering): Port device team_slave_1 removed [ 1914.562882][T14865] team_slave_0 (unregistering): left promiscuous mode [ 1914.570308][T14865] team0 (unregistering): Port device team_slave_0 removed [ 1914.580861][T14865] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1914.594329][T14865] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1914.628229][T14865] bond0 (unregistering): Released all slaves [ 1915.012292][ T11] smc: removing ib device syz1 [ 1915.026398][T14865] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1915.038116][T14865] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1915.068598][T14865] bond0 (unregistering): Released all slaves [ 1915.891923][T14865] bond0 (unregistering): (slave bond4): Releasing backup interface [ 1915.900706][T14865] bond4 (unregistering): Released all slaves [ 1915.909147][T14865] bond0 (unregistering): (slave bond3): Releasing backup interface [ 1915.918170][T14865] bond3 (unregistering): Released all slaves [ 1915.927527][T14865] bond0 (unregistering): (slave bond2): Releasing backup interface [ 1915.937423][T14865] bond2 (unregistering): Released all slaves [ 1915.946485][T14865] bond0 (unregistering): (slave bond1): Releasing backup interface [ 1915.955519][T14865] bond1 (unregistering): Released all slaves [ 1916.040935][T14865] team_slave_1 (unregistering): left promiscuous mode [ 1916.048214][T14865] team0 (unregistering): Port device team_slave_1 removed [ 1916.058443][T14865] team_slave_0 (unregistering): left promiscuous mode [ 1916.067145][T14865] team0 (unregistering): Port device team_slave_0 removed [ 1916.076883][T14865] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1916.089114][T14865] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1916.121972][T14865] bond0 (unregistering): Released all slaves [ 1918.555961][T14865] bond3 (unregistering): Released all slaves [ 1918.688314][T14865] bond2 (unregistering): (slave bridge15): Releasing backup interface [ 1918.748308][T14865] bond2 (unregistering): Released all slaves [ 1919.060378][T14865] bond1 (unregistering): Released all slaves [ 1919.567028][T14865] team0 (unregistering): Port device team_slave_1 removed [ 1919.577287][T14865] team0 (unregistering): Port device team_slave_0 removed [ 1919.587901][T14865] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1919.599162][T14865] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1919.631446][T14865] bond0 (unregistering): Released all slaves [ 1919.892957][T14865] bond3 (unregistering): (slave batadv1): Releasing backup interface [ 1919.902790][T14865] bond3 (unregistering): (slave veth41): Releasing backup interface [ 1919.914351][T14865] bond3 (unregistering): Released all slaves [ 1920.050746][T14865] bond2 (unregistering): Released all slaves [ 1920.371311][T14865] bond1 (unregistering): Released all slaves [ 1920.507727][T14865] team0 (unregistering): Port device team_slave_1 removed [ 1920.518620][T14865] team0 (unregistering): Port device team_slave_0 removed [ 1920.528798][T14865] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1920.561962][T14865] bond0 (unregistering): Released all slaves [ 1920.603559][ T7124] infiniband syz1: ib_query_port failed (-19) [ 1922.222885][T14865] IPVS: stop unused estimator thread 0... [ 2002.719774][ T0] ================================================================== [ 2002.727920][ T0] BUG: KCSAN: data-race in tick_nohz_idle_stop_tick / tick_sched_timer [ 2002.736174][ T0] [ 2002.738497][ T0] write to 0xffffffff85f16d00 of 4 bytes by interrupt on cpu 1: [ 2002.746116][ T0] tick_sched_timer+0x2ad/0x2c0 [ 2002.750969][ T0] __hrtimer_run_queues+0x217/0x700 [ 2002.756251][ T0] hrtimer_interrupt+0x20d/0x7b0 [ 2002.761183][ T0] __sysvec_apic_timer_interrupt+0x52/0x190 [ 2002.767069][ T0] sysvec_apic_timer_interrupt+0x68/0x80 [ 2002.772709][ T0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2002.778683][ T0] acpi_safe_halt+0x20/0x30 [ 2002.783196][ T0] acpi_idle_do_entry+0x19/0x30 [ 2002.788043][ T0] acpi_idle_enter+0x96/0xb0 [ 2002.792628][ T0] cpuidle_enter_state+0xc6/0x260 [ 2002.797650][ T0] cpuidle_enter+0x40/0x60 [ 2002.802064][ T0] do_idle+0x194/0x230 [ 2002.806132][ T0] cpu_startup_entry+0x18/0x20 [ 2002.810901][ T0] start_secondary+0x82/0x90 [ 2002.815484][ T0] secondary_startup_64_no_verify+0x167/0x16b [ 2002.821558][ T0] [ 2002.823871][ T0] read to 0xffffffff85f16d00 of 4 bytes by task 0 on cpu 0: [ 2002.831144][ T0] tick_nohz_idle_stop_tick+0x1b0/0x760 [ 2002.836691][ T0] do_idle+0x177/0x230 [ 2002.840759][ T0] cpu_startup_entry+0x18/0x20 [ 2002.845520][ T0] rest_init+0xf3/0x100 [ 2002.849673][ T0] arch_call_rest_init+0x9/0x10 [ 2002.854528][ T0] start_kernel+0x57d/0x5d0 [ 2002.859035][ T0] x86_64_start_reservations+0x2a/0x30 [ 2002.864495][ T0] x86_64_start_kernel+0x94/0xa0 [ 2002.869441][ T0] secondary_startup_64_no_verify+0x167/0x16b [ 2002.875525][ T0] [ 2002.877835][ T0] value changed: 0xffffffff -> 0x00000001 [ 2002.883548][ T0] [ 2002.885857][ T0] Reported by Kernel Concurrency Sanitizer on: [ 2002.891992][ T0] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 6.5.0-syzkaller-11329-g708283abf896 #0 [ 2002.902746][ T0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2002.912795][ T0] ==================================================================