Warning: Permanently added '[localhost]:64385' (ECDSA) to the list of known hosts. 2020/01/17 13:31:44 fuzzer started 2020/01/17 13:31:46 dialing manager at 10.0.2.10:33701 2020/01/17 13:31:46 syscalls: 2841 2020/01/17 13:31:46 code coverage: enabled 2020/01/17 13:31:46 comparison tracing: enabled 2020/01/17 13:31:46 extra coverage: enabled 2020/01/17 13:31:46 setuid sandbox: enabled 2020/01/17 13:31:46 namespace sandbox: enabled 2020/01/17 13:31:46 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/17 13:31:46 fault injection: enabled 2020/01/17 13:31:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/17 13:31:46 net packet injection: enabled 2020/01/17 13:31:46 net device setup: enabled 2020/01/17 13:31:46 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/17 13:31:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 13:32:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 13:32:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f0000000280)=""/222, 0x2a, 0xde, 0x8}, 0x20) syzkaller login: [ 160.800255][ T8118] IPVS: ftp: loaded support on port[0] = 21 [ 160.801757][ T8120] IPVS: ftp: loaded support on port[0] = 21 13:32:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x42, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 161.095224][ T8122] IPVS: ftp: loaded support on port[0] = 21 [ 161.131930][ T8124] IPVS: ftp: loaded support on port[0] = 21 [ 161.306026][ T8120] chnl_net:caif_netlink_parms(): no params data found [ 161.351178][ T8118] chnl_net:caif_netlink_parms(): no params data found [ 161.396978][ T8122] chnl_net:caif_netlink_parms(): no params data found [ 161.444055][ T8120] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.458357][ T8120] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.471635][ T8120] device bridge_slave_0 entered promiscuous mode [ 161.497826][ T8120] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.508984][ T8120] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.521314][ T8120] device bridge_slave_1 entered promiscuous mode [ 161.548504][ T8118] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.562304][ T8118] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.577412][ T8118] device bridge_slave_0 entered promiscuous mode [ 161.592854][ T8120] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.628571][ T8118] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.639373][ T8118] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.649802][ T8118] device bridge_slave_1 entered promiscuous mode [ 161.660650][ T8120] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.710758][ T8124] chnl_net:caif_netlink_parms(): no params data found [ 161.723276][ T8122] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.733358][ T8122] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.745380][ T8122] device bridge_slave_0 entered promiscuous mode [ 161.762344][ T8120] team0: Port device team_slave_0 added [ 161.778090][ T8122] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.791156][ T8122] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.804097][ T8122] device bridge_slave_1 entered promiscuous mode [ 161.815813][ T8118] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.830023][ T8120] team0: Port device team_slave_1 added [ 161.849002][ T8118] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.881912][ T8118] team0: Port device team_slave_0 added [ 161.898102][ T8118] team0: Port device team_slave_1 added [ 161.907816][ T8122] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.925592][ T8122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.030156][ T8120] device hsr_slave_0 entered promiscuous mode [ 162.090506][ T8120] device hsr_slave_1 entered promiscuous mode [ 162.211205][ T8124] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.221633][ T8124] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.233011][ T8124] device bridge_slave_0 entered promiscuous mode [ 162.250993][ T8122] team0: Port device team_slave_0 added [ 162.266399][ T8122] team0: Port device team_slave_1 added [ 162.286870][ T8124] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.302832][ T8124] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.321222][ T8124] device bridge_slave_1 entered promiscuous mode [ 162.419730][ T8118] device hsr_slave_0 entered promiscuous mode [ 162.487608][ T8118] device hsr_slave_1 entered promiscuous mode [ 162.557406][ T8118] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 162.567459][ T8118] Cannot create hsr debugfs directory [ 162.689990][ T8122] device hsr_slave_0 entered promiscuous mode [ 162.757782][ T8122] device hsr_slave_1 entered promiscuous mode [ 162.827500][ T8122] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 162.844621][ T8122] Cannot create hsr debugfs directory [ 162.869238][ T8124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.893637][ T8124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.963830][ T8124] team0: Port device team_slave_0 added [ 163.007582][ T8124] team0: Port device team_slave_1 added [ 163.169211][ T8124] device hsr_slave_0 entered promiscuous mode [ 163.237625][ T8124] device hsr_slave_1 entered promiscuous mode [ 163.307409][ T8124] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.316872][ T8124] Cannot create hsr debugfs directory [ 163.344656][ T8120] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 163.417624][ T8118] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 163.480867][ T8120] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 163.541712][ T8120] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 163.602425][ T8120] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 163.660971][ T8118] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 163.773923][ T8118] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 163.843161][ T8118] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 163.913547][ T8122] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 163.971115][ T8122] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 164.031040][ T8122] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 164.125609][ T8122] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 164.248318][ T8124] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 164.329260][ T8124] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 164.389595][ T8124] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 164.451054][ T8124] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 164.593841][ T8120] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.612180][ T8118] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.648155][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.662963][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.683031][ T8120] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.843189][ T8122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.856599][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.869643][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.893309][ T8118] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.916735][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.928521][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.942686][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.952573][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.978065][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.993257][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.004910][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.013930][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.039899][ T8122] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.054082][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.066874][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.077355][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.092022][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.102868][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.111915][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.123839][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.138951][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.156043][ T1233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.166941][ T1233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.177699][ T1233] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.188524][ T1233] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.220227][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.239556][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.252376][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.266855][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.279625][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.291318][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.302843][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.313546][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.324359][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.335315][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.346080][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.357565][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.370650][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.381262][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.408008][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.420091][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.431137][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.444784][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.461918][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.477685][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.489987][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.502537][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.516313][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.535546][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.552028][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.570804][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.588700][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.599911][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.614518][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.641039][ T8124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.658566][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.677565][ T8128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.690369][ T8128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.704847][ T8128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.724595][ T8118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.758823][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.775124][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.791850][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.806335][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.823623][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.839925][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.851688][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.864173][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 165.875098][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 165.886462][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.900683][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.920082][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.942189][ T8128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.969163][ T8128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.994042][ T8120] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.016883][ T8124] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.060007][ T8118] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.075207][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.091105][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.110348][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.129110][ T1233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.141153][ T1233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.153801][ T1233] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.164100][ T1233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.181458][ T1233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.220933][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.236480][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.252876][ T8133] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.264708][ T8133] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.276713][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.288054][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.299364][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.312036][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.325251][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.339177][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.352155][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.364818][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.380147][ T8133] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.407349][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.419649][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.429814][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.442972][ T1236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.458776][ T8122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.471661][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.482229][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.494969][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.505649][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.525354][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.538975][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.554989][ T8120] device veth0_vlan entered promiscuous mode [ 166.573100][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.585935][ T8135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.600589][ T8124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.622697][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.632479][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.642847][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.651958][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.664239][ T8120] device veth1_vlan entered promiscuous mode [ 166.676970][ T8118] device veth0_vlan entered promiscuous mode [ 166.693681][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 166.704608][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 166.715697][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.726687][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.744419][ T8118] device veth1_vlan entered promiscuous mode [ 166.760274][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 166.772453][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.783515][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.802091][ T8122] device veth0_vlan entered promiscuous mode [ 166.816268][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 166.827939][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.839697][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.851005][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.861148][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.873996][ T8124] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.900242][ T8122] device veth1_vlan entered promiscuous mode [ 166.928649][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 166.952492][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.965890][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.012953][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.034819][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.049404][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.064966][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.090906][ T8124] device veth0_vlan entered promiscuous mode [ 167.122831][ T8124] device veth1_vlan entered promiscuous mode [ 167.255267][ T8140] BPF:[1] VAR (anon) [ 167.327647][ T8140] BPF:type_id=0 linkage=0 13:32:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) [ 167.365235][ T8141] BPF:[1] VAR (anon) [ 167.378748][ T8140] BPF: [ 167.400760][ T8140] BPF:Invalid name 13:32:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 13:32:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0x0, 0x0, 0x128, 0x128, 0x128, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@inet=@socket2={{0x28, 'socket\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 167.449212][ T8141] BPF:type_id=0 linkage=0 13:32:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) [ 167.469132][ T8140] BPF: [ 167.469132][ T8140] [ 167.472254][ T8141] BPF: [ 167.486468][ T8141] BPF:Invalid name 13:32:44 executing program 2: syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x20000000000000, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 167.498467][ T8141] BPF: [ 167.498467][ T8141] 13:32:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:44 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r0, 0x0, 0x0, 0x0) recvfrom$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 13:32:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:44 executing program 2: syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x20000000000000, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 13:32:44 executing program 2: perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 13:32:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000501010000000000000000000000000a2c000000070a01020000000000000000000000000900020073797a32000001000900010073797a3000000000140000001100010000000000000000000100000a"], 0x54}}, 0x0) 13:32:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:44 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000004500)='/dev/ttyS3\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup3(r0, r1, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, 0x0) 13:32:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) [ 167.955009][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 13:32:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) [ 168.002486][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 13:32:44 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x18, 0x0, &(0x7f00000002c0)={0x2, 0x0, @empty}, 0x39c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10) 13:32:45 executing program 1: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:45 executing program 1: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:45 executing program 1: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000040)={{}, {0x2}, [], {}, [], {0x8}}, 0x24, 0x0) dup3(r0, r1, 0x0) 13:32:45 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000040)={{}, {0x2}, [], {}, [], {0x8}}, 0x24, 0x0) dup3(r0, r1, 0x0) 13:32:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:45 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) [ 169.073240][ T8267] fuse: Bad value for 'fd' 13:32:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:45 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) [ 169.118947][ T8275] fuse: Bad value for 'fd' 13:32:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) [ 169.163071][ T8284] fuse: Bad value for 'fd' 13:32:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:46 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x1, 0x1, 0x101}, 0x14}}, 0x0) 13:32:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000140)='\f', 0x1, 0x1, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x1dd, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="bd", 0x1, 0x0, 0x0, 0x0) 13:32:46 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:47 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:47 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 13:32:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getpid() setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 13:32:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:48 executing program 0: open(0x0, 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140), 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:48 executing program 0: open(0x0, 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) [ 171.887289][ C0] hrtimer: interrupt took 39276 ns 13:32:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:50 executing program 0: open(0x0, 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140), 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getpid() setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 13:32:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140), 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:50 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:50 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:50 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000c40)={{0x14}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_TABLE_HANDLE={0xc}]}], {0x14}}, 0x48}}, 0x0) 13:32:50 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:50 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:50 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:50 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) 13:32:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:50 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) [ 173.893603][ T8428] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 173.902441][ T8430] fuse: Bad value for 'fd' 13:32:50 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:50 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x2c4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0xc8) sendto$inet6(r0, &(0x7f0000000000)='E', 0x11001, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000040)=""/89, 0x11001, 0x2, 0x0, 0x0) 13:32:50 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x2c4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0xc8) sendto$inet6(r0, &(0x7f0000000000)='E', 0x11001, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000040)=""/89, 0x11001, 0x2, 0x0, 0x0) [ 174.058932][ T8454] fuse: Bad value for 'fd' 13:32:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:50 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) [ 174.136531][ T8470] fuse: Bad value for 'fd' 13:32:51 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000380)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000300900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) [ 174.309034][ T8489] MINIX-fs: file system does not have enough zmap blocks allocated. Refusing to mount. 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) [ 174.341367][ T8489] MINIX-fs: bad superblock or unable to read bitmaps 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000380)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000300900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:32:51 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, 0x0) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x0, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:32:51 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, 0x0) 13:32:51 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x0, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, 0x0) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x0, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 13:32:51 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 174.972643][ T8618] fuse: Bad value for 'fd' 13:32:51 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x3, 0x3bc) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f00000000c0)=0x20, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) [ 175.050182][ T8634] fuse: Bad value for 'fd' 13:32:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 13:32:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) [ 175.123102][ T8639] fuse: Bad value for 'fd' 13:32:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 13:32:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:52 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x87f1a7) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000200)={0x0, 0xffffffff000, 0x4}) 13:32:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 13:32:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) [ 175.181792][ T8656] fuse: Invalid rootmode 13:32:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 13:32:52 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 13:32:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) [ 175.243365][ T8668] fuse: Invalid rootmode 13:32:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:52 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) [ 175.308180][ T8679] fuse: Invalid rootmode 13:32:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 13:32:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:32:52 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x48042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:32:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 13:32:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}, 0x1, 0x200000000000000}, 0x0) 13:32:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/64, 0x40}], 0x3, 0x0, 0xfffffffffffffd9a, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:32:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:32:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 13:32:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 13:32:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_DELCHAIN={0x2c, 0x5, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HANDLE={0xc}]}], {0x14}}, 0x54}}, 0x0) 13:32:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x2c, 0x0, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x42800) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x2c, 0x0, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x42800) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:32:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:32:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 13:32:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 13:32:55 executing program 0: sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 13:32:55 executing program 0: sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:55 executing program 0: sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:55 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 13:32:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:55 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 13:32:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:56 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, 0x0, 0x0) 13:32:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 13:32:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, 0x0, 0x0) 13:32:56 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 13:32:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, 0x0, 0x0) 13:32:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:57 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 13:32:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 13:32:57 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 13:32:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 13:32:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 13:32:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:58 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:32:58 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:32:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 13:32:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 13:32:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000004c0)=""/213, 0xd5, 0x2, 0x0, 0x0) 13:32:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 13:32:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 13:32:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 13:32:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 13:32:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x24}}, 0x0) 13:32:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 13:32:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="f0", 0x1, 0x2040851, 0x0, 0x0) shutdown(r0, 0x0) recvfrom$inet(r0, &(0x7f00000004c0)=""/213, 0xd5, 0x0, 0x0, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x24}}, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 13:32:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 13:32:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000040)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0xa}}, 0x14}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x24}}, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:32:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x28, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x28, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 13:32:58 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x3901, 0x0) writev(r0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000800)='$', 0x1}], 0x2) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x28, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 13:32:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/64, 0x40}], 0x3, 0x0, 0xfffffffffffffd9a, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [], {0x14, 0x11, 0x3}}, 0x28}}, 0x0) 13:32:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x20, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x20}}, 0x0) 13:32:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [], {0x14, 0x11, 0x3}}, 0x28}}, 0x0) 13:32:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000000303c7c33d02000000000000ffffffff1000024000000008000000418d15c68f25a3531c5d836bf32f78b34a5b33306f7d0be3f298f92e89c1ccda24614758e2277125e7bd57b419f02813e3eed5864a5269ab78cbbbafca36aa2e1d0d8baa12aaedad1f4f6cbfa004362e110f15a5217f50f159c87ed46e3be26a2dc0fa1aa9da905e768a705bad01cc8f3b1c7a5521ed013182f6c7eabfc5ae95ceb05e81beb0405a96c91fd6e57980844c972f291b58e7c39ab333c2b54a9c37886da294714e2f47e00f9c005820eadec6a85c72c0b24faea69cb7d8bed1a4d69e5cfad7685b00000000378c8fc2b07e6c557a0bb32f6816806ba09e5b51dca83c742c0e5c074ecc177db40000000000000000fa6280c9fcc9d19b9aff6fda4347905391edbe3dfa210b26470c47a10ff53ee4f0fd2688b86c9750df531cbaa9a8b9326eb7fb80023afdd5ccf9823f923b3b7e3bdfa1cd2faaa55fd882532822cc1838b617d86300347cc4a63dbc81acc186d777c1ab05621634f041ef2442d34c678e2aca40b476640d7826395f886013"], 0x24}}, 0x0) 13:32:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x20, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x20}}, 0x0) 13:32:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x20, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x20}}, 0x0) 13:33:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [], {0x14, 0x11, 0x3}}, 0x28}}, 0x0) 13:33:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:33:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1ff, 0x0, 0x0, 0x40}, 0x9c) 13:33:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:33:01 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000000303c7c33d02000000000000ffffffff1000024000000008000000418d15c68f25a3531c5d836bf32f78b34a5b33306f7d0be3f298f92e89c1ccda24614758e2277125e7bd57b419f02813e3eed5864a5269ab78cbbbafca36aa2e1d0d8baa12aaedad1f4f6cbfa004362e110f15a5217f50f159c87ed46e3be26a2dc0fa1aa9da905e768a705bad01cc8f3b1c7a5521ed013182f6c7eabfc5ae95ceb05e81beb0405a96c91fd6e57980844c972f291b58e7c39ab333c2b54a9c37886da294714e2f47e00f9c005820eadec6a85c72c0b24faea69cb7d8bed1a4d69e5cfad7685b00000000378c8fc2b07e6c557a0bb32f6816806ba09e5b51dca83c742c0e5c074ecc177db40000000000000000fa6280c9fcc9d19b9aff6fda4347905391edbe3dfa210b26470c47a10ff53ee4f0fd2688b86c9750df531cbaa9a8b9326eb7fb80023afdd5ccf9823f923b3b7e3bdfa1cd2faaa55fd882532822cc1838b617d86300347cc4a63dbc81acc186d777c1ab05621634f041ef2442d34c678e2aca40b476640d7826395f886013"], 0x24}}, 0x0) 13:33:02 executing program 2: sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:02 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@check_strict='check=strict'}]}) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 13:33:02 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0x3}]}], {0x14, 0x11, 0x3}}, 0x50}}, 0x0) 13:33:02 executing program 2: sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:02 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) [ 185.269657][ T9094] ISOFS: Unable to identify CD-ROM format. 13:33:02 executing program 2: sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x4fb01b62d75a65b, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x3}}, 0x48}}, 0x0) [ 185.373779][ T9094] ISOFS: Unable to identify CD-ROM format. 13:33:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4f9ea924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb1", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:33:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:02 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x4fb01b62d75a65b}], {0x14, 0x11, 0x3}}, 0x3c}}, 0x0) 13:33:02 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:02 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:33:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, 0x0, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, 0x0, 0x0) 13:33:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, 0x0, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4f9ea924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb1", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:33:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000464f9161b11f474d392ccdd4a9370000000900000003000000f8020000d0010000d0010000d00100000000000000000000600200006002000060"], 0x1) 13:33:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="008a000000070000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500000000000000379ca57fea", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671004800022900000000d0ed64f3c3ff010000000085a4e4ebb5ef6700000000000000000000000000000000d9ba45873e98e1e25f5a00"/96], 0x74}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x84}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001100110400"/20, @ANYRES32=r4, @ANYBLOB="000036d000"], 0x20}}, 0x0) 13:33:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, 0x0, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, 0x0, 0x0) 13:33:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, 0x0, 0x0) 13:33:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) [ 188.598092][ T9156] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 13:33:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4f9ea924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb1", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:33:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 13:33:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="008a000000070000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500000000000000379ca57fea", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671004800022900000000d0ed64f3c3ff010000000085a4e4ebb5ef6700000000000000000000000000000000d9ba45873e98e1e25f5a00"/96], 0x74}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x84}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001100110400"/20, @ANYRES32=r4, @ANYBLOB="000036d000"], 0x20}}, 0x0) 13:33:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 191.655344][ T9179] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 13:33:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 13:33:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12e, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfd77, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x12}, 0x14) socket$kcm(0xa, 0x2, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 13:33:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:33:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000000303c7c33d02000000000000ffffffff1000024000000008000000418d15c68f25a3531c5d836bf32f78b34a5b33306f7d0be3f298f92e89c1ccda24614758e2277125e7bd57b419f02813e3eed5864a5269ab78cbbbafca36aa2e1d0d8baa12aaedad1f4f6cbfa004362e110f15a5217f50f159c87ed46e3be26a2dc0fa1aa9da905e768a705bad01cc8f3b1c7a5521ed013182f6c7eabfc5ae95ceb05e81beb0405a96c91fd6e57980844c972f291b58e7c39ab333c2b54a9c37886da294714e2f47e00f9c005820eadec6a85c72c0b24faea69cb7d8bed1a4d69e5cfad7685b00000000378c8fc2b07e6c557a0bb32f6816806ba09e5b51dca83c742c0e5c074ecc177db40000000000000000fa6280c9fcc9d19b9aff6fda4347905391edbe3dfa210b26470c47a10ff53ee4f0fd2688b86c9750df531cbaa9a8b9326eb7fb80023afdd5ccf9823f923b3b7e3bdfa1cd2faaa55fd882532822cc1838b617d86300347cc4a63dbc81acc186d777c1ab05621634f041ef2442d34c678e2aca40b476640d7826395f886013"], 0x24}}, 0x0) 13:33:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="008a000000070000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500000000000000379ca57fea", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671004800022900000000d0ed64f3c3ff010000000085a4e4ebb5ef6700000000000000000000000000000000d9ba45873e98e1e25f5a00"/96], 0x74}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x84}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001100110400"/20, @ANYRES32=r4, @ANYBLOB="000036d000"], 0x20}}, 0x0) 13:33:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[]}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 194.676697][ T9202] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 13:33:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[]}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:33:11 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\t'], 0x11, 0x4}, 0x6010) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 13:33:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[]}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) 13:33:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 394.660238][ T3054] ------------[ cut here ]------------ [ 394.681527][ T3054] Type was not set for devlink port. [ 394.687786][ T3054] WARNING: CPU: 1 PID: 3054 at net/core/devlink.c:6399 devlink_port_type_warn+0x15/0x20 [ 394.687786][ T3054] Kernel panic - not syncing: panic_on_warn set ... [ 394.687786][ T3054] CPU: 1 PID: 3054 Comm: kworker/1:2 Not tainted 5.5.0-rc6-syzkaller #0 [ 394.687786][ T3054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 394.687786][ T3054] Workqueue: events devlink_port_type_warn [ 394.687786][ T3054] Call Trace: [ 394.687786][ T3054] dump_stack+0x197/0x210 [ 394.687786][ T3054] ? devlink_free+0x2d0/0x2f0 [ 394.687786][ T3054] panic+0x2e3/0x75c [ 394.687786][ T3054] ? add_taint.cold+0x16/0x16 [ 394.687786][ T3054] ? __kasan_check_write+0x14/0x20 [ 394.687786][ T3054] ? __warn.cold+0x14/0x3e [ 394.687786][ T3054] ? __warn+0xd9/0x1cf [ 394.687786][ T3054] ? devlink_port_type_warn+0x15/0x20 [ 394.687786][ T3054] __warn.cold+0x2f/0x3e [ 394.687786][ T3054] ? devlink_port_type_warn+0x15/0x20 [ 394.687786][ T3054] report_bug+0x289/0x300 [ 394.687786][ T3054] do_error_trap+0x11b/0x200 [ 394.687786][ T3054] do_invalid_op+0x37/0x50 [ 394.687786][ T3054] ? devlink_port_type_warn+0x15/0x20 [ 394.687786][ T3054] invalid_op+0x23/0x30 [ 394.687786][ T3054] RIP: 0010:devlink_port_type_warn+0x15/0x20 [ 394.687786][ T3054] Code: 89 df e8 de fc 7d fb e9 d3 fe ff ff 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 e8 57 3d 40 fb 48 c7 c7 e0 56 d8 88 e8 ea ec 10 fb <0f> 0b 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 41 55 49 89 f5 41 54 [ 394.687786][ T3054] RSP: 0018:ffffc9000c0dfd30 EFLAGS: 00010282 [ 394.687786][ T3054] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 394.687786][ T3054] RDX: 0000000000000000 RSI: ffffffff815e5396 RDI: fffff5200181bf98 [ 394.987729][ T3054] RBP: ffffc9000c0dfd30 R08: ffff888026c75140 R09: fffffbfff165e7bf [ 394.987729][ T3054] R10: fffffbfff165e7be R11: ffffffff8b2f3df7 R12: ffff88801cf914c0 [ 394.987729][ T3054] R13: 0000000000000080 R14: ffff88802713ee00 R15: ffff88802d136b40 [ 394.987729][ T3054] ? vprintk_func+0x86/0x189 [ 394.987729][ T3054] process_one_work+0x9af/0x1740 [ 394.987729][ T3054] ? pwq_dec_nr_in_flight+0x320/0x320 [ 394.987729][ T3054] ? lock_acquire+0x190/0x410 [ 394.987729][ T3054] worker_thread+0x98/0xe40 [ 394.987729][ T3054] ? trace_hardirqs_on+0x67/0x240 [ 394.987729][ T3054] kthread+0x361/0x430 [ 394.987729][ T3054] ? process_one_work+0x1740/0x1740 [ 394.987729][ T3054] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 394.987729][ T3054] ret_from_fork+0x24/0x30 [ 394.987729][ T3054] Kernel Offset: disabled [ 394.987729][ T3054] Rebooting in 86400 seconds..