0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7100}, 0x0) 14:39:20 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000029c0)=[@rthdrdstopts={{0x18}}], 0x18}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x800000000000004, r1, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) socket(0x18, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001380)='devlink\x00') sendmmsg(r0, &(0x7f0000000d00), 0x1bdd307, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000002600)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/mdstat\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)=0x4, 0x12) 14:39:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$nl_netfilter(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="ff0000000504000000000000000000000000ceb3"], 0x14}}, 0x0) 14:39:20 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3f", 0x15) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7200}, 0x0) 14:39:20 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) ioctl$int_in(r0, 0x800000c004500a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x82) sendmsg$NFQNL_MSG_VERDICT_BATCH(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x58, 0x3, 0x3, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x7}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x5}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x800}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3ff}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0xffff}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x8}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x3}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x841) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_STOP_UNIT(r5, 0x6) pselect6(0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 14:39:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x0) 14:39:21 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000200)=@abs, 0x6e, 0x0}], 0x1, 0x0) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$inet_sctp(r3, &(0x7f0000001980)=[{&(0x7f0000000080)=@in={0x2, 0x4e23, @local}, 0x10, &(0x7f0000001600)=[{&(0x7f00000000c0)="461740b6cebe2fa744930d36883c85eebf13c6b2d6c0a09fe59794daefa2485d34c489b6776bb0e58ce6661177d81ee62300596935e0534bdf62775196fbccf0c05b842f49fe2c0eeee679cdb96c1361054d87683ab4e2db906dc5addf25ee837668fbdf8c884d2890a4de9c", 0x6c}, {&(0x7f0000000140)="ac99230c493afbc19e6f73554f63bef427cb8e", 0x13}, {&(0x7f0000000280)="084d419478f7c1e0b1692a620026ef6a58e26bbec1cc435c4d29b829b891e06027398b3d0babf1545297fe3b7838d08d74db6cd2fa4ffe1b89e3d435783de8", 0x3f}, {&(0x7f00000002c0)="e5e75dcac0f69e4ec862334430a7c14e3f6be75261a48b5b954eb0db6a37d114faa4bc5286e596bb6c1abd4a98bbef57a3f38c3a80e8463963d9135393ea296b5878cd391919456f1ea6c8bc07d3f92698318b63610643df6184cc25739b2f6e559c200e2ed8399f4cc8144729da120fe63d1a25b3e45536ba0c36b1b84a2db2d4eb8cac71013f882cecffc4bcc60d0075c49c32e77acfca2415e20101f0e2c8fb2f9b2496c4c9ed328a1c970f02d3a0453010074d28dbdc953465a1f7a5146e4cf8ab6ab90a88eba55c7ee4146e1402bd", 0xd1}, {&(0x7f0000000400)}, {&(0x7f0000000440)="ffa5000f896a1b66836a943fc1cc3d7f0d89eb231d0f90a85b0c6d", 0x1b}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="427724700aeeb72edbb6b034785748ad94bd4a5cd188a3840de84d68810cd4c9f177447f42c60baa393ff96ef191a78c833b79a561cd48bc869939", 0x3b}, {&(0x7f00000014c0)="d46d287585a6904913174d21dc3709474cd910b60d104b409b77f9273eec20f417d90b9c8c07b58c44e9ae7f34fb1011c219e73b6136dac75e4ddf50ce03e23426cf3fd11037992c", 0x48}, {&(0x7f0000001540)="0893fbd3d820c1a0b204019f04a2a8e8579992d1457d23fc45486c26da6e24b3333bb90415e8d35874209c765d994357ad388f63d9653cb6127ccd3cb43f9a47b92a0d99c4c32e2333f300cbab53849dd6c00e767b6c8efe40d2108bd6c4eb5047990cc38067c3c206da2a48598f643f5252a796ba51669d46635c569ce563b756055e3c65637c523cc12658cde4d754", 0x90}], 0xa, 0x0, 0x0, 0x8000}, {&(0x7f00000016c0)=@in={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000001880)=[{&(0x7f0000001700)="3ae669c5bf3b8b955e93eb7c79bb73d603c66bc84aedeaf7c66e09600b8feb1d347b98e9581fd0226de3dcf817491cf56834f95c9cf31b43bcab7dfcce7e45f88d601e5858fb1c3dcc197766dda57ff07cb4b2dd9a75a4c64b520a776f868d448473d3a543792c5b904ab38bbf8b977444df1e3b7a0cf59843ab20eb430820d5b31d7290ac5fb09288ef4b260ddf1eff69a17e5667c11ec3", 0x98}, {&(0x7f00000017c0)="d2ad7986d28c558acc0972d3658225bf40617723cfd6291a12857f190c22e1da22e41b13f0d20c7da72e9f27e1cf7098ddddd49653af90a2edc1793f13e929e5402586a124176a25b54d39db5fab788984d6e585096ac05933d8f96ae9634d8f6969af6468f69ecd074fab9ec7228ba7b34fd6cf0842c44611ef86d15d10a855c62c127ba38f5ce11a76a353acf5b3e1bd9c4d07108d3f6a4f1733d58157e63b25a5ab066651", 0xa6}], 0x2, &(0x7f00000018c0)=ANY=[@ANYBLOB="18500000001a000084000000000000005c03810002000800180000000000000084000000060000000101240600000000200000000000000084000000080000000ede36e19adfe597fb13ea14bde7bc9118000000000000008400000000000000070002000900080018000000000000008400000005000000000000000500000018000000000000008400000007000000ac14142900000000"], 0x98}], 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f0000000040)) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:39:21 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f00000001c0)={0x8, 'team_slave_0\x00', {'netpci0\x00'}, 0x81}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ashmem\x00', 0x80102, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xd6, &(0x7f00000015c0)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef7507020d447d9de49470d52bafd9c4361aad1970bfcb8129a6ef0ba57d7ef97a908829fd3354d6538094d26a9eacb2ae39233f0494050c730cdaee6d1639c8a46f7f20161953d41200205ec903a3083406d3746b10dd8184a31d35194a085ea81f17fb6d4d5e38f35c4cba786884a3b3017e315c08f3c9f80b32e48420765b541b2ac4b93e41437bc31f2e974ec3aa2fd88df59fb261281a5d27a4b50f92af02f254ff31faf90e06a6eadcb3a2c32b93602761f605d79c233c4e9d3a80705c40b5ddcba24012a8f772a7b0eb9c64459d5542ad63d5d93ed38f69d8e24d7372a7176ef7f2673dff79316ed3f07a68cd8eacf038ddb59ebf5f492d19969046556d9298ec36c60fb64939f9635f482ee1531d2aa3bd9acaa772060ac6c6a13fd49059cc7d9c45c6b8e87ea32bdd1ecde70620928d97ea10256b3d86db053e5aa49c3d05ddb75429d04463fb147e09852d06693b68bdb35fae40b9ba433e2f7125050858b9da61dd96399c225c424c2ccd547636bb063473a7815d4cf929747860d5807166baf89e8fd7c7864f35548e538fec8acf6c88ed8cb821428c95f98eedbace40d968a8c002f717f27896bacb0c848eeb530e7cabf5279ab6db8c80a46f1aea633e6ccf8fd21389b1e0cba8a0d5639e4c924b08666bfa69df3fa5a0e24004d2c5aae5ad5684054ab34c580febd3476281a40d99fcd819a17cd395b4c3e44e0280f70204fb5c85257a47ce0db29eb7c8fa9971eedd57eaec5460a75cb9a95ca731fb1a0c605e715c374db4910eaf0c09b8c5d37da754121ea0eb69abf5e089ed1f7392df699389d6ee54949508c29a6df3140d0b603f1a1d7faf608ff1dbaa6bea8b39e90b979477ac4ed3c5da87266fc088667c8efc354b84e47831d84fed7c01e56bfc217f8253d1f8ce58fd92149b308eec10ca80127f101abac8d80e1fb0e98e14952daa0393a8823e7d95303e8f5ab35dbde1ec6d201bd8ab06205cde4cc14df9447906c8568efe7269363d11fbd31e1706f9bc9184bbc8f5289262ff0e6b86c5015e720ff4032d536d463522fe1f5e1371780a0100010000000000b67b288b47c65ef8364383102c2d339925f27ed5a9881f7aa40982b6b4d76125c82cedd886cd34f54a3f3e84743d42f8b4a5999a0e1935d77f7a6d2c7449129afece0636929e5704b6bb4c2ab9b303f03d91968df461e5975d7a6adfc71549ed64b363f992e22283c3dd78ce6261161628937774dbed79c42bd2ef2aa5dc7a323a996fd6aeff3a8bca2577e831f1db77e789aa983f0c1de249679b60ac0975bcb954bbede81d851bdd1a0a7830962f5c6e4c5a88102171459862b07f4ca9f91f4ce7cb15b3bc2db2e95dacee55645d289b95c62920f506f65361aae1259dfe6e9108b5a9f72f4cefbf85539fff41ba76090907860c08c71a796d2133339eb0282bd9d09c93870b919c4a5423f6ded7cbfc00000008000000000000000000000000a7b38d021b1ecdf1f9353fe520a4b5b8abf4163bd8e3376317a9295d9753fbfc8967fc7f900ced5913f6695de2db49a7275f85d8dfad726a02c3da4ac744835d3507abb66bb7a23d45a5bbc142bd10e2fdd00db4c7e9fa74ce36e0b20f9c4e87a20c6a589f1c0168c896c0c8aad681c73edfe78bf00f8e8a4c6e70630098c133f0e1f92a0d0c1e4b0bf26c31eb33ebe683f973fc3e0aa18f092845d0aaf70ef7921d13ab2706cabe3d650e080826c0de995d37120f7a969219f2258d54ccda50c870726bf374ab2d66f3ed58d13175b781e6cf0f7a7f33e4db27e463900623cff3e635c3e896bed4419981363d11b8297b6b717a3a6942018ec6704b74bedcfb0e871bdff9eabdec8558bae5034d9993ffefe69ce347f33fdba6a9376f54fea892d8039f0f81ea4df88099f44e62fd4e0f46ee5d69a619f48b40dbaf09c008eb7c1a73e2610d4be9c358afb7f437b5dea548f4bb94f4409dba72bada8e39b6f3075bd7c333348ed555cebf480785d9b7ea71386510de844442cfdf50e7ba88d0c31ac0fe985f408d395b49fa19a8087c41e2539cd642bd1ab0c88a4fa78e04c8594942de59576e781fca62875bc919216e8898d1aefc81a244a597d966706f6e692511a4b45503b3c9bfdcfa12a8c1cc40bbe1de89e688ebb064a55d4f4fe00c8483382ead60cbe853a8eff54eb825ce3b07fa05e51f9ffadab3b4000555a3a4326b459f973fb7340ef66a863708fc7626439271e8ba1c871562c9b2dc1b8ba85287aa8dc7486f306a0d0b31bcf8ab9050e1f5dae9773c06dba27a2b3b2a435267877f628bee19254de71c487ba0fd2a04e76f777e5908a4ec621f634f9964ba6c0e372143659828d3"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r4, 0x0, 0x0}, 0x10) 14:39:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7300}, 0x0) 14:39:21 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x210c03, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x3, 0x20000000209}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000080)={r5, r6+10000000}, 0x0) r7 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:39:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000100)={'macvtap0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r5) r6 = socket$xdp(0x2c, 0x3, 0x0) ftruncate(r6, 0x2) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r7, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0xffffffda}]) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:21 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3f", 0x15) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7400}, 0x0) 14:39:21 executing program 4: syz_emit_ethernet(0x3, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYPTR, @ANYRES64], 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r4, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team_slave_0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'nr0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x0) 14:39:21 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0x0, 0x0}, 0x10) 14:39:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7500}, 0x0) 14:39:21 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001ff, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x3ff, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xe) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x100, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000040), &(0x7f00000000c0)=0x0) geteuid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getgid() ioctl$FBIO_WAITFORVSYNC(r1, 0x40044620, 0x0) ioprio_get$uid(0x0, r2) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000000)={{0x0, @name="07951b01c871ad2c3071ab706f2da9c2203280705cde3b340b45f025016f116e"}, 0x8, 0xfffffffffffff800, 0x8000}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) unshare(0x40000000) 14:39:21 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r3 = dup2(r0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r4, 0x0, 0x0}, 0x10) 14:39:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000180)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cab46118cbacb5ef9e5c8bf0400cbb14041", 0x68}], 0x1}, 0x0) read(r1, &(0x7f0000000040)=""/119, 0x77) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') getsockopt$inet_sctp6_SCTP_STATUS(r8, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r8, 0x84, 0xf, &(0x7f0000000740)={r9, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@loopback, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r10, r11}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x3, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='auxv\x00') r13 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') r14 = shmget(0x3, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) statx(r12, &(0x7f0000000980)='./file0\x00', 0x6000, 0x40, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = socket$netlink(0x10, 0x3, 0x4) writev(r16, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) fstat(r16, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) setresuid(r19, 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r13, 0x5429, &(0x7f00000008c0)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) syz_open_procfs$namespace(r22, &(0x7f0000000500)='ns/user\x00') shmctl$IPC_SET(r14, 0x1, &(0x7f0000000900)={{0x3, r15, r17, r19, r20, 0x0, 0xfffe}, 0xa52d, 0xd54b, 0x1ff, 0x1, r21, r22, 0x6}) r23 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='auxv\x00') r24 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') r25 = shmget(0x3, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) statx(r23, &(0x7f0000000980)='./file0\x00', 0x6000, 0x40, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) setresuid(r29, 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r24, 0x5429, &(0x7f00000008c0)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) syz_open_procfs$namespace(r32, &(0x7f0000000500)='ns/user\x00') shmctl$IPC_SET(r25, 0x1, &(0x7f0000000900)={{0x3, r26, r27, r29, r30, 0x22, 0xfffe}, 0xa52d, 0x80, 0x1ff, 0x1, r31, r32, 0x1}) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f00000015c0)=@filter={'filter\x00', 0xe, 0x5, 0x125e, [0x0, 0x20000340, 0x2000054c, 0x20001110], 0x0, &(0x7f0000000100), &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x5, 0x30, 0x10, 'veth0_to_team\x00', 'veth0_to_bond\x00', 'veth1_to_hsr\x00', 'team0\x00', @broadcast, [0x0, 0xff, 0x0, 0x0, 0xff], @broadcast, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x6e, 0x6e, 0xbe, [], [], @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x4, {0x8000}}}}}, {0x11, 0x4, 0x8863, 'team_slave_1\x00', 'xfrm0\x00', '\x00', 'team_slave_0\x00', @local, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @broadcast, [0xff], 0x6e, 0xce, 0x11e, [], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffff8}}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x100, {0x3c}}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x2, [{0x5, 0x11, 0x201, 'ipvlan1\x00', 'macsec0\x00', 'hsr0\x00', 'ip6_vti0\x00', @random="4e3578600f88", [0x0, 0xff, 0xff, 0x0, 0xff], @random="d83ce6014af2", [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0x986, 0x9be, 0x9ee, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'ip_vti0\x00', {}, 'batadv0\x00', {0xff}, 0xf}}}, @among={{'among\x00', 0x0, 0x880}, {{@zero, @zero, 0x1, {[0x2, 0x6, 0x2, 0xe, 0x0, 0x6, 0xffffb3c9, 0x1000, 0x8, 0x7f, 0x9, 0x1, 0x4, 0x2, 0x3, 0x1, 0x1, 0x495, 0xfffffffa, 0x1, 0x7, 0x0, 0xef, 0x9, 0x8, 0x8001, 0x4, 0x6, 0x1f, 0x3, 0x1f, 0x80000001, 0x1, 0x1f, 0xdd5d3a18, 0x1, 0xfffffffd, 0x1, 0x73e, 0x1000, 0xe0fa, 0xf240, 0xfffeffff, 0x9, 0x8000, 0x15, 0x5, 0x3, 0x0, 0x8, 0x400, 0x5, 0x96, 0x2, 0x7, 0x7fffffff, 0x2, 0x7fffffff, 0x3, 0x8000, 0x4, 0x3, 0x4, 0x2, 0x4, 0x2, 0x8, 0x0, 0x566, 0x1f, 0x7ff, 0x5, 0x6, 0x7982, 0x17, 0xfffffff8, 0x6, 0x2, 0xff, 0x3000, 0x3, 0x0, 0x2, 0x8, 0xc65, 0x1, 0x4, 0x8f0, 0x9, 0x6702, 0x1, 0xa9e, 0xff, 0x7, 0x400, 0x40, 0xfffffff8, 0x1, 0x1c5, 0x401, 0x8, 0x7, 0x8, 0x61, 0x0, 0x4, 0x19b, 0x4, 0x2, 0x7, 0x80000001, 0x5, 0xff, 0x9, 0x8, 0x4aa, 0xfffffffe, 0x9, 0x0, 0x6, 0x2, 0x73, 0x9, 0xad6, 0xfffffff9, 0x9, 0x8, 0xfffffe00, 0x4, 0x6, 0x3, 0x0, 0x9, 0x7, 0xffffff7f, 0x4, 0x70fb, 0x8, 0x1, 0xe9, 0x6, 0x0, 0x7, 0x32c6, 0x5, 0x7fffffff, 0x4, 0x6, 0x8001, 0x81, 0x20493c5a, 0x7, 0x1, 0xea, 0x3ff, 0x7, 0xca, 0xfffffffe, 0x8, 0x9, 0x80000001, 0x2a991581, 0x9, 0x4, 0x1, 0x84, 0x79b8, 0x7, 0x5, 0x5, 0x0, 0x6, 0x8, 0x3, 0x1ff, 0x7f, 0x3ff, 0x80000000, 0x0, 0x7, 0x89d, 0x4, 0xfa9, 0x3, 0x10000, 0x7, 0x10001, 0x4, 0x80, 0x8001, 0x1, 0x4, 0xfffff174, 0x1f, 0x4, 0x1, 0x3f, 0x6, 0x9, 0xffffffc0, 0x1, 0x4, 0x0, 0x7ff, 0x8000000, 0x7, 0xe28, 0x8, 0x4, 0x40, 0x7, 0x9, 0x8001, 0x6, 0xfffffffd, 0x6, 0x6, 0x2, 0x6, 0x0, 0xf3, 0x2d4000, 0x7, 0x4, 0x7, 0x7, 0x7fffffff, 0x7, 0x81, 0x8272, 0x10001, 0xf4a6, 0x7fffffff, 0xbe, 0x10000, 0x3, 0x5, 0x4, 0x3e8, 0x68a2, 0x95, 0x3, 0x7fffffff, 0x1, 0xfffffffd, 0x7f, 0xffffff4d, 0xfffffffe, 0x2, 0x3d11, 0x3, 0x7, 0x0, 0x3, 0xfffff000, 0x1ff, 0x5], 0x5, [{[0xb4, 0x4], @multicast1}, {[0x9b, 0x20], @broadcast}, {[0x200, 0x4], @rand_addr=0x9}, {[0x7, 0x1], @broadcast}, {[0x4c], @multicast1}]}, {[0xff, 0x9, 0x65, 0x9, 0x78, 0x401, 0x100, 0x6, 0x0, 0xc2, 0x40, 0x40, 0x3, 0xffffffc1, 0x1, 0x1, 0x8, 0x2, 0xdb, 0x1, 0x0, 0x7, 0x20, 0x1f, 0x9, 0x1000, 0x1, 0xc99c, 0x2, 0x80000001, 0x10000, 0x9, 0x4, 0x7ff, 0x5, 0x80, 0x4, 0xc8, 0x2, 0x0, 0x800000, 0x3f, 0x4, 0x401, 0x0, 0x7, 0xde, 0xffffffff, 0x4, 0x3, 0x3f, 0x1, 0x5, 0x602a, 0x3ff, 0x7, 0xfff, 0x7f, 0x80, 0x0, 0x400000, 0x8001, 0x7, 0x4aad, 0x2e773217, 0xd44e, 0x40, 0xf1, 0x0, 0x81, 0x2, 0x81, 0x7, 0x3f, 0x401, 0x1, 0x3f, 0x1c8000, 0x5, 0x4, 0x5, 0x4, 0x5, 0xfffffffb, 0xc1, 0x7, 0x8, 0x3, 0xb04, 0x0, 0x0, 0x3, 0x7, 0xf4b, 0x7ff, 0x9, 0x80000000, 0x4, 0x2, 0x1e, 0x7, 0x81, 0xfffffffc, 0x8, 0x51, 0x1a81, 0xfffffffa, 0xffff, 0x2, 0x7fff, 0x7fff, 0x8, 0x20, 0x2, 0x41da0f8c, 0x1, 0x7fff, 0x0, 0x80, 0x8, 0x800, 0x8, 0x80, 0x200, 0x8, 0x9, 0x81, 0x9, 0x1f, 0x80000001, 0x4, 0x5, 0xfff, 0x3, 0x0, 0x1, 0x1000, 0x1, 0x3f, 0x7, 0x2, 0x3, 0x2, 0x2, 0x200, 0x8, 0xfffffffc, 0x79, 0x800, 0x4, 0x7ff, 0x1f, 0x4, 0x8, 0x96ed, 0x8001, 0x9, 0xfff, 0x25, 0x7, 0x3a, 0x2, 0xeb, 0x7dd3, 0x6a55, 0x3, 0x7f, 0x1, 0x9, 0x3ff, 0x8000, 0x0, 0x1, 0x800, 0x2, 0x5e586ce4, 0x3f, 0xfff, 0x7f, 0x4, 0x2, 0x7f, 0x7, 0x7fff, 0x3, 0x4, 0x2de9, 0x8001, 0x2, 0x8, 0xffffffff, 0xfff, 0xff, 0x6c, 0x0, 0x10001, 0xffffffff, 0xfff, 0x5, 0x7, 0x3ff, 0x9, 0x3ff, 0x808, 0x10001, 0x3f, 0x2, 0xfffffffb, 0x4, 0x3ff, 0x8, 0x5, 0x6c9f, 0x5, 0x0, 0xf4, 0x1, 0xd9d, 0x10001, 0x2, 0x0, 0x5, 0x8000, 0x400, 0x80000000, 0x23, 0x775, 0xfffff943, 0x8, 0x504f, 0x8000, 0x4, 0x7f, 0x1f, 0x7, 0xa4, 0x8, 0x4, 0x8, 0x8, 0x6, 0x7, 0xf7, 0xffff, 0x101, 0x0, 0xffffff21, 0x0, 0x1ff, 0x0, 0x92, 0x3, 0x80000001, 0x1, 0x7, 0x9, 0x10001], 0x3, [{[0x0, 0x3ff], @local}, {[0x9, 0x400], @dev={0xac, 0x14, 0x14, 0xb}}, {[0x3, 0x4], @broadcast}]}}}}], [@common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x17}, 0xfffffffffffffffe}}}], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}, {0x11, 0x5c, 0x6003, 'macsec0\x00', 'vlan0\x00', 'ip6erspan0\x00', 'lo\x00', @random="0e98fa8a5b62", [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @remote, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0xae, 0x176, 0x1a6, [@owner={{'owner\x00', 0x0, 0x18}, {{r7, r11, r20, r27, 0x4}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x6, 0x4, 0x9, 0x0, 0x0, "2e73110225c6e6654cd7c6adccfbeb77d30ff9c268414af4e3459f1d1206d1d188680767c39ec1576bc9a5edc7c6a1c9f2f2de8a43f3c0805b46914169aa8fd2"}}}, @common=@log={'log\x00', 0x28, {{0x8, "03cd0ed5c9ff1b34e78d76338a822364d24db671a1f5137826c940dca16d", 0xa}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{0x9, 0x2, 0xfc56767dc3acb1a7, 'batadv0\x00', 'veth1_to_team\x00', 'batadv_slave_0\x00', 'vxcan1\x00', @local, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0x0, 0x0, 0xff], 0x3ce, 0x3fe, 0x42e, [@bpf0={{'bpf\x00', 0x0, 0x210}, {{0x2b, [{0x2, 0x1f, 0x20, 0x9}, {0x3, 0x2f, 0x6, 0x2}, {0x7, 0x8, 0x7f, 0x2}, {0x8, 0x81, 0xfa, 0x2c9}, {0x4, 0x4, 0x49, 0x9}, {0x3, 0x3, 0x1, 0x558}, {0x0, 0xd5, 0x4, 0x1}, {0xd9a2, 0x3, 0x4, 0x4}, {0xe51d, 0x1, 0x20}, {0x6, 0x2, 0xff, 0x8}, {0x8, 0x51, 0x0, 0x7}, {0x0, 0x7, 0x1, 0x6}, {0x8001, 0x9, 0x8, 0x1}, {0x1, 0x7f, 0x20, 0x2}, {0x8b2, 0x3, 0x1, 0x800}, {0x1f, 0xe9, 0xea, 0xffffffc1}, {0x4, 0x5, 0x81, 0x3ff}, {0x9, 0x1, 0x4, 0x1775}, {0x4, 0x4, 0x1, 0xff0cda0c}, {0x4b, 0x9, 0x3, 0x9}, {0x2, 0x6, 0x5, 0x4}, {0x80, 0x10, 0x82, 0x1000}, {0x7580, 0x6, 0x0, 0x81}, {0x0, 0x5, 0x1f, 0x8}, {0x5, 0x80, 0x1, 0x5}, {0x1, 0x4, 0x4, 0x3}, {0x9, 0x7, 0x5}, {0x19b9, 0x5, 0x1, 0x4000000}, {0xbb1, 0xfc, 0x1, 0xffff}, {0x22c, 0x1, 0x4, 0x8}, {0x6, 0x7, 0x0, 0x7fffffff}, {0x200, 0x8, 0x1f, 0x3db8}, {0x100, 0x2d, 0xc1, 0x200}, {0x1000, 0x0, 0x20, 0x1}, {0x7, 0x0, 0x6, 0x9}, {0x2, 0x7f, 0x8, 0x9}, {0x0, 0x0, 0xff, 0x59c}, {0x8, 0x9, 0x8, 0x80000001}, {0x17b, 0x4, 0x5, 0x8}, {0x6, 0x20, 0x0, 0x2}, {0x9, 0x20, 0x9, 0x2}, {0x5, 0x4, 0x18, 0x2dc}, {0x3, 0x0, 0x88, 0x8}, {0x6, 0x2, 0x31, 0x10001}, {0x1, 0x4, 0x8, 0x4}, {0x1, 0x20, 0xf7}, {0xffe1, 0x80, 0x8, 0x3}, {0xff, 0x7, 0x1, 0x81}, {0x800, 0x1f, 0x8, 0xffffffff}, {0xe4, 0x8, 0x1, 0x10000}, {0x2, 0x0, 0x1f, 0x5}, {0x6ac8, 0x6, 0x7, 0x1}, {0x81}, {0x3, 0x9c, 0x5c, 0x2}, {0x53, 0x0, 0x3f, 0x4}, {0x6616, 0x3f, 0x48, 0x7}, {0x1, 0x1, 0x81, 0x1d}, {0x0, 0x1, 0x5, 0x3}, {0x7fff, 0x8, 0x81, 0x1}, {0x5, 0x22, 0x9, 0xfffffe62}, {0x6, 0x7, 0x1, 0x2}, {0x0, 0x1f, 0x0, 0x100}, {0x7, 0x2, 0x7f, 0x3f}, {0x920c, 0x0, 0x0, 0x12f2f4cf}], {0xffff}}}}, @comment={{'comment\x00', 0x0, 0x100}}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xffe00}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x12d6) 14:39:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7600}, 0x0) 14:39:21 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 983.098326][ T7548] IPVS: ftp: loaded support on port[0] = 21 14:39:22 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="3401000010000507000057030000000010000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x134}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:39:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7700}, 0x0) 14:39:22 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000180)=""/223, 0xdf) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0x0, 0x0}, 0x10) 14:39:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:22 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 983.483577][T31185] tipc: TX() has been purged, node left! [ 983.519570][ T7574] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 14:39:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7800}, 0x0) 14:39:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_NF_CALL_ARPTABLES={0x8}]}}}]}, 0x3c}}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f00000001c0)=ANY=[], 0x0, 0x0) msgsnd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="08003bffcc5a894e0088"], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') getsockopt$inet_sctp6_SCTP_STATUS(r10, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r10, 0x84, 0xf, &(0x7f0000000740)={r11, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@loopback, 0x4e23, 0x80000001, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r12, r13}, {0x0, 0x4, 0x2, 0x0, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x3, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) r14 = getgid() r15 = getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r15, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r16 = getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r16, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000340)={{0x1, r8, r9, r13, r14, 0x20, 0x6}, 0x0, 0x0, 0x6, 0x2, 0x40, 0x8, 0x10000, 0x1, 0xfff, 0xff, r15, r16}) [ 983.543528][ T7574] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.1'. 14:39:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000040)=0x8) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a9000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="7c000000877c090000005a4e003652f58737232c01000700"/35, @ANYRES32=r8, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@ipv4_newrule={0x6c, 0x20, 0x400, 0x70bd28, 0x25dfdbff, {0x2, 0x14, 0x0, 0x9, 0xe1, 0x0, 0x0, 0x7, 0x19}, [@FRA_DST={0x8, 0x1, @broadcast}, @FRA_FLOW={0x8, 0xb, 0x6}, @FRA_SRC={0x8, 0x2, @local}, @FRA_FLOW={0x8, 0xb, 0x9}, @FRA_SRC={0x8, 0x2, @broadcast}, @FRA_DST={0x8, 0x1, @loopback}, @FRA_FLOW={0x8, 0xb, 0x80000001}, @FRA_DST={0x8, 0x1, @multicast1}, @FRA_FLOW={0x8, 0xb, 0x1}, @FRA_GENERIC_POLICY=@FRA_GOTO={0x8, 0x4, 0x7fffffff}]}, 0x6c}}, 0x0) 14:39:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000080)=0x4) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) [ 983.621414][ T7581] netlink: 'syz-executor.4': attribute type 38 has an invalid length. 14:39:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7900}, 0x0) [ 983.823171][ T7581] netlink: 'syz-executor.4': attribute type 38 has an invalid length. 14:39:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0xa, 0x10, 0x4, "dffb3c6e612c25f2e86524634a4541c70aff2c293560e56f16aade3f7377d4dff4d28bfc9df41ce7a9a0eb21c24b941c6ae16d2d316bff1ddb26064523ba8221", "dda704bcf1425bb8c692ad48d00a04304b27dd16957a7181fac3115578c1a00892c68a520752e013beb157d42a86f1f71e8ef3f9b69df737708e1f1f9ec82250", "bb8eb9c0cb2dc7a52679482a47f98f82fc07813ad3a8a78bbf75fdb44b6bcd79", [0x3b, 0x7fff]}) r5 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x4) writev(r6, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r7 = socket$netlink(0x10, 0x3, 0x4) writev(r7, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) io_uring_register$IORING_REGISTER_FILES(r5, 0x2, &(0x7f0000000080)=[r6, 0xffffffffffffffff, r0, r7], 0x4) socket$kcm(0x11, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x4) writev(r8, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) sendmsg(r8, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14, 0xfffffffe}, 0x80, &(0x7f0000000080)}, 0x0) 14:39:22 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:22 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x1000000000000a) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x1000000000000a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$rxrpc(r1, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc0fc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$RDS_GET_MR(r7, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f0000000000)=""/79, 0x4f}, &(0x7f0000000080), 0x48}, 0x20) 14:39:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7a00}, 0x0) 14:39:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000000001, 0x84) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xdd6b, 0x10000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000049}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="24000000bc52e5e176b82b7245a9bfdee4cf5f570ced8c95d606367ea4d9caaf2852d700", @ANYRES16=r2, @ANYBLOB="100028bd7000fedbdf251100000008002b000600000008003a0004000000"], 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4c081) r3 = accept4$tipc(r1, &(0x7f0000000100)=@id, &(0x7f0000000240)=0x10, 0x0) shutdown(r3, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}], 0x10) 14:39:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000080)={0x5, 0x200, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$kcm(0x11, 0x3, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000000)=0xfffffffe) 14:39:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7b00}, 0x0) 14:39:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x9effffff, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000010001fff00039c160000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002000120008000100677470001400020008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="0c000a00aa070000001d2796aaaaaaaa000000"], 0x4c}}, 0x0) 14:39:23 executing program 4: pipe(&(0x7f0000000680)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c350b6346b93e129c5075429b32be1e7e2033b78e47cff0fb0323217d21ddd656b4ff8c0132e22e2e69086d7fbad4692eda8cbe82b24e40f0bff96740fdc358643f5bf1808ca98071927411d5a05829f03ce906c88bfc9200a3a341f6fff2818b5a6fa8384877d02b62a22474e3b897c9f99ac06b01d25c0a36d11fa3fb3c3b6a5ba81978a641e3eed3c7bf5beac3b3626351d3d0c1817ed5d1c7ba7db94e41db9fbf1241a592c0309b01d9f541924529ab597a6e3bc72cb90be632bcb9ae6178537cea8102c13ec1c9a1ce732e7f16871b43fbb80300db32d2385142d6d63a19d0225137a344579a321ecdc593ad9fe34bbd6835d0f04c6e45b39db05b422cd2cf7c0f281c079954b5f9c8713091737fa4c59e4a21279ceea475e17d38aa44a791af7c15b7d35a5bbb655a925e07", @ANYRES32=0x0, @ANYRESHEX=r0, @ANYRESDEC], 0x6, 0x1) syz_open_dev$amidi(0x0, 0x4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'veth1_vlan\x00'}) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) getpid() r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000000c0)={0x18, 0x0, {0x3, @dev={[], 0x1e}, 'macvlan1\x00'}}, 0x1e) connect$pppoe(r2, &(0x7f0000000400)={0x18, 0x0, {0x1, @remote, 'ip6gretap0\x00'}}, 0x1e) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x2, @dev={[], 0xe}, 'erspan0\x00'}}, 0x1e) writev(0xffffffffffffffff, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b", 0xd}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746b", 0x3a, 0x200003e8, 0x0, 0x0) 14:39:23 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922a", 0x1a) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7c00}, 0x0) [ 984.446156][ T7631] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 14:39:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x1000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x7e, 0x2, 0xffffffff}) 14:39:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7d00}, 0x0) 14:39:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000100)={0x1, 0x3f}, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r4, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7e00}, 0x0) [ 984.886883][ T7652] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 14:39:23 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x1212, 0x4, {"1b1eadbad67650afb819d9e398a0e0de"}, 0x8, 0x1ff}}}, 0xa0) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x400002, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180), r3}}, 0x18) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000340)={0x2, 0xfffffffa}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xdf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef7507020d447d9de49470d52bafd9c4361aad1970bfcb8129a6ef0ba57d7ef97a908829fd3354d6538094d26a9eacb2ae39233f0494050c730cdaee6d1639c8a46f7f20161953d41200205ec903a3083406d3746b10dd8184a31d35194a085ea81f17fb6d4d5e38f35c4cba786884a3b3017e315c08f3c9f80b32e48420765b541b2ac4b93e41437bc31f2e974ec3aa2fd88df59fb261281a5d27a4b50f92af02f254ff31faf90e06a6eadcb3a2c32b93602761f605d79c233c4e9d3a80705c40b5ddcba24012a8f772a7b0eb9c64459d5542ad63d5d93ed38f69d8e24d7372a7176ef7f2673dff79316ed3f07a68cd8eacf038ddb59ebf5f492d19969046556d9298ec36c60fb64939f9635f482ee1531d2aa3bd9acaa772060ac6c6a13fd49059cc7d9c45c6b8e87ea32b000400000000000097ea10256b3d86db053e5aa49c3d05ddb75429d04463fb147e09852d06693b68bdb35fae40b9ba433e2f7125050858b9da61dd96399c225c424c2ccd547636bb063473a7815d4cf929747860d5807166baf89e8fd7c7864f35548e538fec8acf6c88ed8cb821428c95f98eedbace40d968a8c002f717f27896bacb0c848eeb530e7cabf5279ab6db8c80a46f1aea633e6ccf8fd21389b1e0cba8a0d5639e4c924b08666bfa69df3fa5a0e24004d2c5aae5ad5684054ab34c580febd3476281a40d99fcd819a17cd395b4c3e44e0280f70204fb5c85257a47ce0db29eb7c8fa9971eedd57eaec5460a75cb9a95ca731fb1a0c605e715c374db4910eaf0c09b8c5d37da754121ea0eb69abf5e089ed1f7392df699389d6ee54949508c29a6df3140d0b603f1a1d7faf608ff1dbaa6bea8b39e90b979477ac4ed3c5da87266fc088667c8efc354b84e47831d84fed7c01e56bfc217f8253d1f8ce58fd92149b308eec10ca80127f101abac8d80e1fb0e98e14952daa0393a8823e7d95303e8f5ab35dbde1ec6d201bd8ab06205cde4cc14df9447906c8568efe7269363d11fbd31e1706f9bc9184bbc8f5289262ff0e6b86c5015e720ff4032d536d463522fe145e1371780a0100010000000000b67b288b47c65ef8364383102c2d339925f27ed5a9881f7aa40982b6b4d76125c82cedd886cd34f54a3f3e84743d42f8b4a5999a0e1935d77f7a6d2c7449129afece0636929e5704b6bb4c2ab9b303f03d91968df461e5975d7a6adfc71549ed64b363f992e22283c3dd78ce6261161628937774dbed79c42bd2ef2aa5dc7a323a996fd6aeff3a8bca2577e831f1db77e789aa983f0c1de249679b60ac0975bcb954bbede81d851bdd1a0a7830962f5c6e4c5a88102171459862b07f4ca9f91f4ce7cb15b3bc2db2e95dacee55645d289b95c62920f506f65361aae1259dfe6e9108b5a9f72f4cefbf85539fff41ba76090907860c08c71a796d2133339eb0282bd9d09c93870b919c4a5423f6ded7cbfc00000008000000000000000000000000a7b38d021b1ecdf1f9353fe520a4b5b8abf4163bd8e3376317a9295d9753fbfc8967fc7f900ced5913f6695de2db49a7275f85d8dfad726a02c3da4ac744835d3507abb66bb7a23d45a5bbc142bd10e2fdd00db4c7e9fa74ce36e0b20f9c4e87a20c6a589f1c0168c896c0c8aad681c73edfe78bf00f8e8a4c6e5276dfa5f97c67a6f92a0d0c1e4b0bf26c31eb33ebe683f973fc3e0aa18f092845d0aaf70ef7921d13ab2706cabe3d650e080826c0de995d37120f7a969219f2258d54cc0600000000000000ab2d66f3ed58d13175b781e6cf0f7a7f33e4db27e463900623cff3e635c3e896bed4419981363d11b8297b6b717a3a6942018ec6704b74bedcfb0e871bdff9eabdec8558bae5034d9993ffefe69ce347f33fdba6a9376f54fea892d8039f0f81ea4df88099f44e62fd4e0f46ee5d69a619f48b40dbaf09c008eb7c1a73e2a548f4bb94f4409dba72bada8e39b6f3075bd7c333348ed555cebf480785d9b7ea71386510de844442cfdf50e7ba88d0c31ac0fe985f408d395b49fa19a8087c41e2539cd642bd1ab0c88a4fa78e04c8594942de59576e781fca62875bc919216e8898d1aefc81a244a597d966706f6e692511a4b45503b3c9bfdcfa12a8c1cc40bbe1de89e688ebb064a55d4f4fe00c8483382ead60cbe853a8eff54eb825ce3b07fa05e51f9ffadab3b4000555a3a4326b459f973fb7340ef66a863708fc7626439271e8ba1c871562c9b2dc1b8ba85287aa8dc7486f306a0d0b31bcf8ab9050e1f5dae9773c06dba27a2b3b2a435267877f628bee19254de71c487ba0fd2a04e76f777e5908a4ec621f634f9964ba6c0e372143659828d3f4c3de9a91dda8cf63c095b45b2fc87dcf1c1ec4ff308ff6994129b6c01f27cd5a87728644d03589dcef21f85eea9feef2aff9629a0cf6706faa5f549fb0af340eb09a1f32e3c7cf1dea706baf86d7c686f64fba06"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x10, 0x0, r2}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r7, 0x0, 0x0}, 0x10) 14:39:23 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_UNIQUE(r5, 0x40106410, &(0x7f00000001c0)={0x39, &(0x7f0000000180)="19ad989eefdec0e15c6e33449491d8559d2f053fbbd41e7cef050940fde89ab6bd771d54339daac7ec77513489350d948f07014288684085f1"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef7507020d447d9de49470d52bafd9c4361aad1970bfcb8129a6ef0ba57d7ef97a908829fd3354d6538094d26a9eacb2ae39233f0494050c730cdaee6d1639c8a46f7f00000000000000005ec903a3083406d3746b10dd8184a31d35194a085ea81f17fb6d4d5e38f35c4cba786884a3b3017e315c08f3c9f80b32e48420765b541b2ac4b93e41437bc31f2e974ec3aa2fd88df59fb261281a5d27a4b50f92af02f254ff31faf90e06a6eadcb3a2c32b93602761f605d79c233c4e9d3a80705c40b5ddcba24012a8f772a7b0eb9c64459d5542ad63d5d93ed38f69d8e24d7372a7176ef7f2673dff79316ed3f07a68cd8eacf038ddb59ebf5f492d19969046556d9298ec36c60fb64939f9635f482ee1531d2aa3bd9acaa772060ac6c6a13fd49059cc7d9c45c6b8e87ea32bdd1ecde70620928d97ea10256b3d86db053e5aa49c3d05ddb75429d04463fb147e09852d06693b68bdb35fae40b9ba433e2f7125050858b9da61dd96399c225c424c2ccd547636bb063473a7815d4cf929747860d5807166baf89e8fd7c7864f35548e538fec8acf6c88ed8cb821428c95f98eedbace40d968a8c002f717f27896bacb0c848eeb530e7cabf5279ab6db8c80a46f1aea633e6ccf8fd21389b1e0cba8a0d5639e4c924b08666bfa69df3fa5a0e24004d2c5aae5ad5684054ab34c580febd3476281a40d99fcd819a17cd395b4c3e44e0280f70204fb5c85257a47ce0db29eb7c8fa9971eedd57eaec5460a75cb9a95ca731fb1a0c605e715c374db4910eaf0c09b8c5d37da754121ea0eb69abf5e089ed1f7392df699389d6ee54949508c29a6df3140d0b603f1a1d7faf608ff1dbaa6bea8b39e90b979477ac4ed3c5da87266fc088667c8efc354b84e47831d84fed7c01e56bfc217f8253d1f8ce58fd92149b308eec10ca80127f101abac8d80e1fb0e98e14952daa0393a8823e7d95303e8f5ab35dbde1ec6d201bd8ab06205cde4cc14df9447906c8568efe7269363d11fbd31e1706f9bc9184bbc8f5289262ff0e6b86c5015e720ff4032d536d463522fe145e1371780a0100010000000000b67b288b47c65ef8364383102c2d339925f27ed5a9881f7aa40982b6b4d76125c82cedd886cd34f54a3f3e84743d42f8b4a5999a0e1935d77f7a6d2c7449129afece0636929e5704b6bb4c2ab9b303f03d91968df461e5975d7a6adfc71549ed64b363f992e22283c3dd78ce6261161628937774dbed79c42bd2ef2aa5dc7a323a996fd6aeff3a8bca2577e831f1db77e789aa983f0c1de249679b60ac0975bcb954bbede81d851bdd1a0a7830962f5c6e4c5a88102171459862b07f4ca9f91f4ce7cb15b3bc2db2e95dacee55645d289b95c62920f506f65361aae1259dfe6e9108b5a9f72f4cefbf85539fff41ba76090907860c08c71a796d2133339eb0282bd9d09c93870b919c4a5423f6ded7cbfc00000008000000000000000000000000a7b38d021b1ecdf1f9353fe520a4b5b8abf4163bd8e3376317a9295d9753fbfc8967fc7f900ced5913f6695de2db49a7275f85d8dfad726a02c3da4ac744835d3507abb66bb7a23d45a5bbc142bd10e2fdd00db4c7e9fa74ce36e0b20f9c4e87a20c6a589f1c0168c896c0c8aad681c73edfe78bf00f8e8a4c6e70630098c133f0e1f92a0d0c1e4bf1f16c31eb33ebe683f973fc3e0aa18f092845d0aaf70ef7921d13ab2706cabe3d650e080826c0de995d37120f7a969219f2258d54ccda542a70726bf374ab2d66f3ed58d13175b781e6cf0f7a7f33e4db27e463900623cff3e635c3e896bed4419981363d11b8297b6b717a3a6942018ec6704b74bedcfb0e871bdff9eabdec8558bae5034d9993ffefe69ce347f33fdba6a9376f54fea892d8039f0f81ea4df88099f44e62fd4e0f46ee5d69a619f48b40dbaf09c008eb7c1a73e2610d4be9c358afb7f437b5dea548f4bb94f4409dba72bada8e39b6f3075bd7c333348ed555cebf480785d9b7ea71386510de844442cfdf50e7ba88d0c31ac0fe985f408d395b49fa19a8087c41e2539cd642bd1ab0c88a4fa78e04c8594942de59576e781fca62875bc919216e8898d1aefc81a244a597d966706f6e692511a4b45503b3c9bfdcfa12a8c1cc40bbe1de89e688ebb064a55d4f4fe00c8483382ead60cbe853a8eff54eb825ce3b07fa05e51f9ffadab3b4000555a3a4326b459f973fb7340ef66a863708fc7626439271e8ba1c871562c9b2dc1b8ba85287aa8dc7486f306a0d0b31bcf8ab9050e1f5dae9773c06dba27a2b3b2a435267877f628bee19254de71c487ba0fd2a04e76f777e5908a4ec621f634f9964ba6c0e372143659828d318e362947f6f59f969d7683eea6ddca35c2e375d462f4c08ee2345625018a3c8a64973caef1875e4080d7e3af580bcaf356f3cde835152b91d3afaf0895f81338e9c17bebb7a43f6346f014b3876304942fc8630b5f04e52a6ee1320903b75fa057adc10f1e1fa83b29b4755e0f3b66b2d57384dabfb564b62b430111aa1eeedc07272e285decb788ab4c319182b6f5b45e50bceac5a"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r6, 0x0, 0x0}, 0x10) 14:39:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x7f00}, 0x0) 14:39:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922a", 0x1a) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000080), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r6, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:24 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:24 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x22084, 0x0) r1 = socket(0x11, 0x0, 0x0) write(r1, &(0x7f00000000c0), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x3, 0x8002) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f00000004c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x4000, 0x0) r3 = socket(0x2b, 0x80a, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000280)={0x1, 0x7, 0x1000, 0x47, &(0x7f0000000340)="9124742f4121833be25948289d649df4f2191f6f19c95e446acbaf13217cf50ec25f6c3b72b129d6444dd79b5f2ddc07169127f6be5c5c613b31d99bb00eedb16fb2e294486120", 0x7b9, 0x0, &(0x7f0000001cc0)="aa768c6aa32e1ca434fd8a96eff0ca02192f8b9cacd108c0922ad4a34b1e8600d271b8811cac106482918e1eb8f4feea24b7f0c71b9602b1d465aebcbf9048d799d76e7baa3b221755ce707b3410af20804fcf3f83ab92c63882d6aa0307d74ec0bb566371020832d750d52a691d2e655a8b8007a483c33f202a428e45e9242aac8a611c7b453c36976cdf846cd4a78b0d2fcb9d531e5744085d3bb87f9a901c88b23335c71820c543953014a494490be652ada222d4e962e23ecb3a99c8e0dbb5c2c5719d873f7f59fd2493e061bc937d74a881417b0a11f5faf559cb5260ee02dc926315a9aa957064ad36e9f614b5f7481023bdaac932c9d75cb4274e574af306d1faff7fb96cc405f0c2ec9a61828b9adfc1be873aa461f2dab81ab8eccaa23bcbc8571d0b0707245a3c2d4b07458b43b55422e0046cda432ece10ab83a2e1a79489ce61f3cb79c56f6a63f76d57ebda8f5679366282e6f763e7a7b5c9e5143d1242cf4964e699b1a59d7568377c9fea4bff617758b2f6c94bb987d5247ee13c1cfe52573f5f789eccf7aee5fb19122057707c834d7ca420e50db5608d1faabc7f1c7a9cdb4b78baee602caedbb1a0c3948d7ef0b6846237874a3414ae126a2abc785135f66557f1002ba6d43a92058c06134938e66d5c6013b5bad71f19efdeafd95add2c18ffa76aa73b609bc10ee0d355a0c389f90a5efa57ff3281f0f2dc7524ae4431cb219876ad73ebf5af8afff6f69d0706807616489ecd9e686398bef8be1ded7d283cce62b8069fa52085faa1df00b7fa17220cbc1a820325bcbf1dab7be95323c5c1aacdd2f3063abfe2595ba95613d53143b5fc9e967d4c18cd7745328495da9780718e52d872b8e314a0dabe13d80af7116e55f0bbfb680aed586c68ab72dcda4384e704ad85c04936d2033894550914c5265a8b88f6bc95f0809b01ab9f9aa34b159b191e64800d6e7afb02c70c6214ce4f65f26703fd9c6cf627069086238dd53862f1676279089eeb3161fc157417909a7f4615caffe71c66a98259856e7ed93be57f8a62622c48bb7c03f8b12234753b5fe941cc7c237442169b6ec188cc8e3b739eec493e67429f7f97f998a61309edd20f7553c7ab725071937ddc86607d9ba928ff8a32e6d840403a3927ff732331282d0b668ea7fd185eb688ab4c6b7cd042a51196b91c04cf416826b286ed9c1e5ef5214a502ec5b3535a290f809a363377e839f800d8b3ad3903b9bf3a3b895a29a80bc43d5b1fe06832db1fe0121b6bab823bc341f34da3ac8f48b0dfb61e7152f8af3128a2f0ca5cd299882082d93491be83f64da87080d714370e22819aaffc43cfe849954b81bccb4c2cf3fcc673edda5b9f7f9c87b8f5897ee839195720f1e9c78ce05b45bae984b83b75edb55d922d2c11e4110774d72505a702129ebf489ae017810de9c8d8f69fd3fd9bef649b8c971d7d1ce708cf948c2545eb041685a7b29a5ba892ff18d1cdeffefe040a1879e4b0e6cc377864bacc644ae2c1915064001ea322c4881a9a18663ffe1b8dd8648ea7289c88d16eff7a12a557c9762742d89287abf97af3efac577ea78513cbd2e116fada2dbca9f0613090f7b07ed24587a25c9897ac6b56f037e7760aeb132f48b0e5c355c0bf69ead637021ed8862d86607f0011f81f96e36c76a061ec4446feeaf00bfb4b74b3e66fb96438d5d2273ccf0e1b20b5b35baa12a5a2f22801d4b688cc5e35263fcfa35724046b1c64a9d6c4a96df5f320a1fb5bc37d9e3e249e6f88d5172e48f27ed9c24f3a1410e91a24e8a7d492a27682c5a04a4e273ad966fe6024f087e5caa00202e8cbeb5457038f94b9ea130e0f5f1bafb21b236707ec0a2ca2f993c36015e642068e9884512e43e3970233e1fabd403ae2231ea611dac6634becde408b124c3a9ab5397b771a300bca9cdf9e6ddcc003df33923d14138b16fac94b7812ec87536a889458234025a8c16c2b9e5027cde8900d9259a7d2cfb98834d9d7e6a57ef0ab0aa732191e96d658e2dbb47748153641b3d2617d97c43f7d84cf52604549695912bfc0e265904e18b6be4fa59dc36609f098b0be0b203ca7c2c859b86d1be54e2efd1bd10d99f4e3eb3e9e591bef83694070169fa06c18b8f611a2836952da12e1eef137d4cf982ac6e18a1b8c06fa44286ea5ce6c107290175569b7ae90e721e4fd247ea94f48f6707143b017cdf5ffaf3fd82fb2a20f3141a309978e4854c9093b1451ce79eb87e7b47d4818505b30bbeb2ab27d3f27f49e770a060064434d81e36640f1f1487134b4b6362be649d68a1ad4070e38ae28b2a5ae32f90106eee44917e5c7ade7bf8cc96449e0dc85526f93add107f00b74f9e48f591c8c17cb519ee2bda8f173db4cbcf372ff0bbdeec7978097a7c5be73e0b449b3f25aba8e0b29faa4562a4beb77fec3420d9cc711df268a92c37c8b294673684007cd535db96f6bf545ad7cd43e6e33b0a9a5025b581a104b1abe7eb739acfe0843f226868818f6432601ec18c9ee303866d5c97b74ce333735bec0a32612563e01fbc05f7cfe41cd0a3b1f8db1cd09c561c0368a130dfff934311ba72c97b113546ef1fa6acba38106774b7c2735c3ab93ea0bd1684860b2c0564e02b630a7fb21dba09544cbd445d666e6fc8640ed8ccca0ae9275bbbccd3f511639f9197f57392dcf14c1df72d797a3f2983bc1b50e4ea9b421124b5004eff350e1535029792f22e213eaf4e4db15ea870ea8dadf4d9a576e3be9f7afbd840b3c5fba8d4805be3aa6732843"}) fcntl$notify(r2, 0x402, 0x80000030) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x22d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) socket(0xa, 0x3, 0x8) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x0) dup2(r5, r2) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) set_tid_address(&(0x7f0000000000)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9']) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:39:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8100}, 0x0) 14:39:24 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xd6, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, r5, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r6, 0x0, 0x0}, 0x10) 14:39:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8200}, 0x0) 14:39:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = fcntl$dupfd(r2, 0x406, r1) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000200)=r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) r4 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCAP(r7, 0x80685600, &(0x7f00000002c0)) sendmsg(r4, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:24 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$input_event(r5, &(0x7f00000001c0)={{r6, r7/1000+10000}, 0x14, 0xb4fa, 0x6}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_TSC(0x1a, 0x1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef7507020d447d9de49470d52bafd9c4361aad1970bfcb8129a6ef0ba57d7ef97a908829fd3354d6538094d26a9eacb2ae39233f0494050c730cdaee6d1639c8a46f7f20161953d41200205ec903a3083406d3746b10dd8184a31d35194a085ea81f17fb6d4d5e38f35c4cba786884a3b3017e315c08f3c9f80b32e48420765b541b2ac4b93e41437bc31f2e974ec3aa2fd88df59fb261281a5d27a4b50f92af02f254ff31faf90e06a6eadcb3a2c32b93602761f605d79c233c4e9d3a80705c40b5ddcba24012a8f772a7b0eb9c64459d5542ad63d5d93ed38f69d8e24d7372a7176ef7f2673dff79316ed3f07a68cd8eacf038ddb59ebf5f492d19969046556d9298ec36c60fb64939f9635f482ee1531d2aa3bd9acaa772060ac6c6a13fd49059cc7d9c45c6b8e87ea32bdd1ecde70620928d97ea10256b3d86db053e5aa49c3d05ddb75429d04463fb147e09852d06693b68bdb35fae40b9ba433e2f7125050858b9da61dd96399c225c424c2ccd547636bb063473a7815d4cf929747860d5807166baf89e8fd7c7864f35548e538fec8acf6c88ed8cb821428c95f98eedbace40d968a8c002f717f27896bacb0c848eeb530e7cabf5279ab6db8c80a46f1aea633e6ccf8fd21389b1e0cba8a0d5639e4c924b08666bfa69df3fa5a0e24004d2c5aae5ad5684054ab34c580febd3476281a40d99fcd819a17cd395b4c3e44e0280f70204fb5c85257a47ce0db29eb7c8fa9971eedd57eaec5460a75cb9a95ca731fb1a0c605e715c374db4910eaf0c09b8c5d37da754121ea0eb69abf5e089ed1f7392df699389d6ee54949508c29a6df3140d0b603f1a1d7faf608ff1dbaa6bea8b39e90b979477ac4ed3c5da87266fc088667c8efc354b84e47831d84fed7c01e56bfc217f8253d1f8ce58fd92149b308eec10ca80127f101abac8d80e1fb0e98e14952daa0393a8823e7d95303e8f5ab35dbde1ec6d201bd8ab06205cde4cc14df9447906c8568efe7269363d11fbd31e1706f9bc9184bbc8f5289262ff0e6b86c5015e720ff4032d536d463522fe145e1371780a0100010000000000b67b288b47c65ef8364383102c2d339925f27ed5a9881f7aa40982b6b4d76125c82cedd886cd34f54a3f3e84743d42f8b4a5999a0e1935d77f7a6d2c7449129afece0636929e5704b6bb4c2ab9b303f03d91968df461e5975d7a6adfc71549ed64b363f992e22283c3dd78ce6261161628937774dbed79c42bd2ef2aa5dc7a323a996fd6aeff3a8bca2577e831f1db77e789aa983f0c1de249679b60ac0975bcb954bbede81d851bdd1a0a7830962f5c6e4c5a88102171459862b07f4ca9f91f4ce7cb15b3bc2db2e95dacee55645d289b95c62920f506f65361aae1259dfe6e9108b5a9f72f4cefbf85539fff41ba76090907860c08c71a796d2133339eb0282bd9d09c93870b919c4a5423f6ded7cbfc00000008000000000000000000000000a7b38d021b1ecdf1f9353fe520a4b5b8abf4163bd8e3376317a9295d9753fbfc8967fc7f900ced5913f6695de2db49a7275f85d8dfad726a02c3da4ac744835d3507abb66bb7a23d45a5bbc142bd10e2fdd00db4c7e9fa74ce36e0b20f9c4e87a20c6a589f1c0168c896c0c8aad681c73edfe78bf00f8e8a4c6e70630098c133f0e1f92a0d0c1e4b0bf26c31eb33ebe683f973fc3e0aa18f092845d0aaf70ef7921d13ab2706cabe3d650e080826c0de995d37120f7a969219f2258d54ccda50c870726bf374ab2d66f3ed58d13175b781e6cf0f7a7f33e4db27e463900623cff3e635c3e896bed4419981363d11b8297b6b717a3a6942018ec6704b74bedcfb0e871bdff9eabdec8558bae5034d9993ffefe69ce347f33fdba6a9376f54fea892d8039f0f81ea4df88099f44e62fd4e0f46ee5d69a619f48b40dbaf09c008eb7c1a73e2610d4be9c358afb7f437b5dea548f4bb94f4409dba72bada8e39b6f3075bd7c333348ed555cebf480785d9b7ea71386510de844442cfdf50e7ba88d0c31ac0fe985f408d395b49fa19a8087c41e2539cd642bd1ab0c88a4fa78e04c8594942de59576e781fca62875bc919216e8898d1aefc81a244a597d966706f6e692511a4b45503b3c9bfdcfa12a8c1cc40bbe1de89e688ebb064a55d4f4fe00c8483382ead60cbe853a8eff54eb825ce3b07fa05e51f9ffadab3b4000555a3a4326b459f973fb7340ef66a863708fc7626439271e8ba1c871562c9b2dc1b8ba85287aa8dc7486f306a0d0b31bcf8ab9050e1f5dae9773c06dba27a2b3b2a435267877f628bee19254de71c487ba0fd2a04e76f777e5908a4ec621f634f9964ba6c0e372143659828d3"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r8, 0x0, 0x0}, 0x10) 14:39:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8300}, 0x0) 14:39:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setreuid(0x0, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000200), 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000001c0)) setreuid(0x0, 0x0) lstat(0x0, &(0x7f0000000940)) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, 0x0) getresuid(&(0x7f0000000100), 0x0, &(0x7f0000000240)) inotify_init() r4 = socket(0x2, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r5 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$char_usb(r5, &(0x7f0000002a80)=""/174, 0xae) getpid() r6 = getpid() process_vm_writev(r6, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/145, 0x91}, {&(0x7f0000000380)=""/70, 0x46}, {&(0x7f0000000400)=""/195, 0xc3}, {&(0x7f0000000500)=""/185, 0xb9}, {&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000180)=""/44, 0x2c}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/6, 0x6}, {&(0x7f0000000600)=""/244, 0xf4}, {&(0x7f0000000700)=""/131, 0x83}], 0xa, &(0x7f0000002a40)=[{&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f0000000880)=""/63, 0x3f}, {&(0x7f00000008c0)=""/110, 0x6e}, {&(0x7f00000029c0)=""/93, 0x5d}], 0x4, 0x0) r7 = getpgrp(r1) r8 = syz_open_procfs(r7, &(0x7f0000000080)='net/icmp6\x00') writev(r8, &(0x7f0000000080), 0x5b) 14:39:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922a", 0x1a) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:24 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r2) recvfrom$unix(r2, &(0x7f00000001c0)=""/215, 0xd7, 0x40, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) dup2(r1, r0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x6cdee716) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r7, 0x0, 0x0}, 0x10) 14:39:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8400}, 0x0) 14:39:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sync_file_range(0xffffffffffffffff, 0x7ff, 0xb1f6, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x80, 0x480000) lseek(0xffffffffffffffff, 0x20, 0x3) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000180)="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") r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r6 = socket$netlink(0x10, 0x3, 0x4) writev(r6, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r7 = socket$netlink(0x10, 0x3, 0x4) writev(r7, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r8 = socket$netlink(0x10, 0x3, 0x4) writev(r8, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r9 = socket$netlink(0x10, 0x3, 0x4) writev(r9, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYRES16=r6, @ANYRESOCT=0x0, @ANYRESHEX=0x0, @ANYPTR64=&(0x7f00000009c0)=ANY=[@ANYBLOB="efa1568dc2f037a1be444d169a190e89cb841e647fdb2c406086c9b089ec69677298df6576845d2bff5df640fcde96a537d0733c2c23f26940901f78d9fa147dfe59eb4e4895d18ba5e1a856e043b07cea34e3a422ddb78561f5c0d834529cedeb96728eba36e8af60562b098eb3336e434980d59133a8d0b919a3fd60a479873d2f69c79d41210dbe726abc2b2e3df80171a90edc", @ANYRESHEX=r7, @ANYRES32=r0, @ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="22a19fc7fc3c54", @ANYPTR64, @ANYRESOCT=r8, @ANYPTR64], @ANYRESOCT=r1, @ANYRESHEX, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYPTR, @ANYPTR, @ANYPTR, @ANYRES64=r9, @ANYBLOB="98aa181ce4330ab9431cc99761949af546e081b3e896c9de965ef5892e6ec26fd7475f58b184f35d9d203411e85456a7ec95b73b9739bc7ead718993eb1085b65f0b3185dd083633808ba5587ba3da8f599b2b48f9"]]], @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000d00000000000000000000000000000000000000000000000000000000000000000000007841f4070668e856884cd461e6263896bca6c22b43acdff1b4e31aeda79f0713ab72a6d1eae843af67bb9bc0168f9ffd037180c4135be41dd357315abb7299d6656ad63ab8f16e", @ANYRES64], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000010000000504000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0000001000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000004000000000000007f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaa280000000000000000000000000000000000000000000000000000ac14141fac14141d04000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3) 14:39:24 executing program 4: socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x17, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@broadcast, @in6=@rand_addr="f26302d5222a1164c4327061e93af5f4", 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x8885) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) process_vm_writev(r1, &(0x7f0000000bc0)=[{&(0x7f00000001c0)=""/185, 0xb9}, {&(0x7f0000000a40)=""/204, 0xcc}, {&(0x7f0000000b40)=""/79, 0x4f}], 0x3, &(0x7f0000000c00)=[{&(0x7f00000002c0)=""/209, 0xd1}, {&(0x7f0000000840)=""/212, 0xd4}, {&(0x7f0000000cc0)=""/100, 0x64}, {&(0x7f0000000d40)=""/97, 0x61}, {&(0x7f0000000500)=""/24, 0x18}, {&(0x7f0000000540)=""/49, 0x31}, {&(0x7f0000000580)=""/52, 0x34}, {&(0x7f00000005c0)=""/117, 0x75}, {&(0x7f0000000640)=""/1, 0x1}], 0x9, 0x0) 14:39:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000180)={0xa10000, 0x8001, 0x6697, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x990ae4, 0x7ff, [], @p_u32=&(0x7f0000000080)=0xfff}}) r5 = socket(0x9, 0x0, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r5, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x34, r6, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x881}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x104402}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x48, r6, 0x200, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7}]}, 0x48}, 0x1, 0x0, 0x0, 0x24044014}, 0x40004) 14:39:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8500}, 0x0) 14:39:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922a", 0x1a) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:25 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) finit_module(r3, &(0x7f00000002c0)='*{\x00', 0x2) r4 = socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}, {&(0x7f0000000480)="33889b3956640e0d9c89b803044fe1fa90cfd5ceda962bf0fc0a2be8fd469a8fbf27ec20502e6b874b1f2bb0a033d8e71e83a9bac51538a058033c014723681d5d22be7c1c948cc6fe82b11c093b0cf126c6ecb7b53c10797cb0f2e889ad37506b5dc9754f166103539a956e73dbcc4e520d32e4c01a1b4dd84361e493e4623b633b0006ecd710848e6b0de02c4ba96095617e36904dafac0ea182a00d2dd4e98b67c7679d508a2b7a607e619dc8819587b05c3f56bfd3551b3a05436c16cd5c27de11b0ad01fe11a566445fbb45e35941957ba2637fb5d3dc73436e75a9171b3ef83a9cca98345335c320d274fe732e", 0xf0}], 0x2) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f00000003c0)) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000180)={0x40, 0x1, 0x9, 0x8, 0x7fff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_START(r7, 0x4142, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xd6, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xffffffffffffffc8, &(0x7f0000000040)=""/181, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r8 = socket$netlink(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_TIMERSLACK(0x1e) r11 = dup2(r10, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = openat$cgroup_ro(r11, &(0x7f0000000580)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r12, 0x1261, &(0x7f00000005c0)=0x2) writev(r8, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) sendmsg$NLBL_CIPSOV4_C_ADD(r8, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012abd7000fddbdf250100000018000100ffffffff0800020002000000040008000800020003000000"], 0x30}, 0x1, 0x0, 0x0, 0x4044040}, 0x10) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000380)) 14:39:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r1}) read$alg(r4, &(0x7f0000000180)=""/68, 0x44) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:25 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000100)={0x0, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x3e, 0x4, @tid=r0}, &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)='/dev/dlm-monitor\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000680)=[{&(0x7f0000000280)=""/173, 0xad}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/67, 0x43}, {&(0x7f00000005c0)=""/50, 0x32}, {&(0x7f0000000600)=""/89, 0x59}], 0x5, &(0x7f00000008c0)=[{&(0x7f0000000700)=""/228, 0xe4}, {&(0x7f0000000800)=""/140, 0x8c}], 0x2, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000, 0x50000) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={0xffffffffffffffff, &(0x7f0000000380)="7345adf44da6988cd3aa0e032b1dfbd310e96edf2d7d4288ac5a4d83105855327cd8452729ff0583633c2ffbafa8a5c3c28f335f8c83c70f53056582109d0d225e46c1e97b46ed795723ffe0a86fc2b1ece660844829a32910c2806a4760abd04fa99719c712ec87c5f9482506e8c506dda6a63e9e6394c49298001ff642c7df1f11b653888067adfd4389a573c8a746b689471807b2d5bf5d6b0a49e76bd611cbfe6bc0e3b7bca44bda9f8dd652365b57d02087aa02de859da7908b4aa2c95841630b3b850d3fb9"}, 0x20) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) unshare(0x40000600) 14:39:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8600}, 0x0) 14:39:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r6 = dup2(r4, r5) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) write(r7, &(0x7f0000000140)="c937abfeb683201af8421783096efe465b949138a4ccfb2dff9c141694f21e4b4e95dc89e0cc68620d252812d136dfc46e38400bd2952ed4363415571c14238726a46390fe527b97cc44b763b8c44e534024fed00e95dddf7adcc77e32f6e25a6c39fc88e3acc6b0f5311a16d63c686c65dde9a81a78d5f50e7029c971c5db623603fa77c85b37ecc99a7ee3c5ead175e5829be60c6d32b318c6d8d2ce9c202dd650c21d59f4a343f5730738d0f4f13164a692a9513dbb35", 0xb8) ioctl$TIOCEXCL(r7, 0x540c) r8 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r8, 0x0, 0x0, 0x0) accept4$packet(r8, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r11, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$inet6(r10, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f00000002c0)="5ba959631262efff5e0878cb0be20b20e2462d1170d3e0da8168953b757d55b9df4ed3f6752a5761e67b292f3c87c127b2e902b89d70aaa31e26e1ed4813b866e37bb1222589a493d36517c2d95533d20c258e8f535b54d631f3d520badea78f5eebb342", 0x64}, {&(0x7f00000001c0)="a9b69413e7873d6e61d3", 0xa}, {&(0x7f0000000340)="9b8f477dc00e9ef8f7b30fb12cbc5280fa4e872c7c00c413949c3311343de0bf3f6367acbf8dbb502f06088db4c3040a6e582db30fa03f5be5b0827a3d14154b8cf2b43ab5543f7ccd3bd8ed39584ec4c8680ef1e8a568f21fb94332891157d5f7833aadf3227e87d565f14e347bfcf445929820a01f94c68193f833e7f936076c102fa7c0d791737ade41e13e88a3fadf228bb865a0261884d32670fb01a569bc7a5b6cc8d9edc62720", 0xaa}, {&(0x7f0000000400)="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", 0x1000}], 0x4, &(0x7f0000001600)=[@rthdr={{0x68, 0x29, 0x39, {0x33, 0xa, 0x0, 0x81, 0x0, [@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}, @local, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}]}}}, @dstopts_2292={{0x1048, 0x29, 0x4, {0x8, 0x206, [], [@pad1, @enc_lim={0x4, 0x1, 0x4}, @enc_lim, @enc_lim={0x4, 0x1, 0x3}, @calipso={0x7, 0x20, {0x3, 0x6, 0x7, 0x7f, [0x2, 0x0, 0x7]}}, @generic={0x5c, 0x1000, "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"}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xdf}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @local}, r9}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x81}}], 0x1108}, 0x24004000) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x19, 0x1, 0xcf79, 0x4, 0x400, r6, 0x8, [], r9, r12, 0x3}, 0x3c) 14:39:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="d800000018008100e00f8001014cb904021d57ea0b007c06e87c55a1bc000900b8000699030007000500154001008178a800160005000100e5580000000002000000006f94007134cf6efb8000a007a290457f0189b316277ce06bbacbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edb3de5f863eb2084cea524b57a5025ccca9e00360db798262f3d08fad956273523d9869b4667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4", 0xd8}], 0x1}, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x10) 14:39:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8700}, 0x0) 14:39:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:25 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') sendfile(r1, r2, 0x0, 0xa808) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') r3 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r5 = socket$netlink(0x10, 0x3, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)=0x4) writev(r5, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) ioctl$FICLONE(r4, 0x40049409, r5) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000980)='numa_maps\x00', 0x0, 0xffffffffffffffff) sendmsg$tipc(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {&(0x7f0000000140)}, {&(0x7f0000000240)}, {&(0x7f00000003c0)="866747e29af9c3dbfcec2c574780db5ee1cfcc798f1cf7ad0c1a0fadfe8f2f7f6ef15fdddb58e747eec97f628cd835156c22cec531e662655c1650bc2c71797016ee3247569900df33013dae41dd4045b428e8ca6d49ba8ce54fe7dbc9e5bb1b4c33fa4d1c1f2ec97f0794dca9e4429693dde0eb1e266c9eedcb72a1c9f882305570e63d2d3557677b3bd6c9b8682b6f6bbcf02d7498d8eeb6105568c46533c3523909936506057d8074df23a54144ea81596beb9710cc4ae862de9d703691ac97846b79c795bdefbcd19299f859b61d79164d731e", 0xd5}, {&(0x7f0000000300)}, {&(0x7f0000000580)="8167ad6093d894137e87d6e433c6f6fdad8121c728a98612ab7ae6cf2e9dbd505a26da0542f79a81ef43501561e641a91ea3922e", 0x34}, {&(0x7f0000000680)}, {&(0x7f0000000700)="1ec26813f7316246020849a38c1ce1be3eb78cc0aaf3ebba2cbd5bb4ac783e12a817972f9ed7e3d11674eeece333f4d475379120fbd50748c8e227f84dc7d0ce58b76251088f7311d6bf6fc3000cc410736b31e53ba9e92238b22ed805f7c5ca6b758716d37d1203e833f9ca4e4288e22f19044d01966fb9d171d70e672f36d0d222e71bda47280f0f6c17", 0x8b}], 0x8, &(0x7f0000000880), 0x0, 0x80004}, 0x1) [ 987.089719][ T7758] IPVS: ftp: loaded support on port[0] = 21 14:39:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8800}, 0x0) 14:39:26 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:26 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) connect(r1, &(0x7f0000000440)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x80) dup3(0xffffffffffffffff, r1, 0x80000) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r5, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00', r5}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, r7, 0xd0f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local, 0x7b37}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x6c}}, 0x4040) r8 = socket$netlink(0x10, 0x3, 0x4) writev(r8, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) sendmsg$TIPC_NL_MEDIA_GET(r8, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000880)={0xd0, r7, 0x586006ce52856bab, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x362a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x16a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4040800}, 0x4080) openat$fb0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fb0\x00', 0x800, 0x0) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f00000005c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c0085324601541ec42350b9aad777f35e615e0c6a5f74b74734e5097839491f4d48dc2406f06779c3bf0287ba7b006084281f989d260578afc7b3e81974c5f5ccf1cb19bc58b260b4e1d691969450564cf3130bd1df2ba4f669174de928ab5a035b5cd6354adceead9b5548b234b200d5c97f2b8825378e1b0c369e298399d6c3ff0100000e679e", @ANYRES16=r9, @ANYBLOB="00032dbd7000fedbdf250e00000008000100ffffffff200049000aac0f000bac0f0001ac0f0002ac0f000000000009ac0f000cac0f00"], 0x3c}, 0x1, 0x0, 0x0, 0x440}, 0x8010) r10 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r10, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8900}, 0x0) [ 987.560350][ T7777] tipc: Enabling of bearer rejected, failed to enable media [ 987.708436][ T7777] tipc: Enabling of bearer rejected, failed to enable media [ 987.792024][ T7786] IPVS: ftp: loaded support on port[0] = 21 14:39:26 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:26 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat(r5, &(0x7f0000000180)='./file0\x00', 0x101001, 0x16) r7 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001000)={0xb4, r8, 0xc4e, 0x70bd29, 0x0, {}, [{{0x8, 0x1, r9}, {0x4}}, {{0x8}, {0x80, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0xdd4, 0x2, 0x3f}, {}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x4}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000002c0)={@rand_addr, 0x0}, &(0x7f0000000300)=0x14) r11 = socket$netlink(0x10, 0x3, 0x4) writev(r11, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000340)={'netpci0\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r16, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r16, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000380)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b80)=""/39, 0x27}, {&(0x7f0000000bc0)=""/110, 0x6e}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/132, 0x84}], 0x4}, 0x2040) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r21, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r21, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r21, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) accept$packet(r0, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e00)=0x14) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r26, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r23, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r26, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r26, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000f00)={'vxcan0\x00', r26}) r28 = socket$nl_route(0x10, 0x3, 0x0) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r31, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r28, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r31, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r31, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) clock_gettime(0x0, &(0x7f0000007200)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000001140)=""/252, 0xfc}, {&(0x7f0000001240)=""/122, 0x7a}, {&(0x7f00000012c0)=""/57, 0x39}, {&(0x7f0000001300)=""/215, 0xd7}], 0x4, &(0x7f0000001440)=""/114, 0x72}, 0x2}, {{&(0x7f00000014c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f0000001540)=""/214, 0xd6}], 0x1}, 0x272}, {{&(0x7f0000001680)=@ipx, 0x80, &(0x7f0000002980)=[{&(0x7f0000001700)=""/255, 0xff}, {&(0x7f0000001800)=""/237, 0xed}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000002900)=""/72, 0x48}], 0x4, &(0x7f00000029c0)=""/22, 0x16}, 0x4}, {{&(0x7f0000002a00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004d40)=[{&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/82, 0x52}, {&(0x7f0000004b00)=""/220, 0xdc}, {&(0x7f0000004c00)=""/179, 0xb3}, {&(0x7f0000004cc0)=""/117, 0x75}], 0x6, &(0x7f0000004dc0)=""/227, 0xe3}, 0x5}, {{&(0x7f0000004ec0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000004f40)=""/55, 0x37}], 0x1}, 0x6c}, {{0x0, 0x0, &(0x7f0000005740)=[{&(0x7f0000004fc0)=""/76, 0x4c}, {&(0x7f0000005040)=""/226, 0xe2}, {&(0x7f0000005140)=""/127, 0x7f}, {&(0x7f00000051c0)=""/224, 0xe0}, {&(0x7f00000052c0)=""/228, 0xe4}, {&(0x7f00000053c0)=""/242, 0xf2}, {&(0x7f00000054c0)=""/3, 0x3}, {&(0x7f0000005500)=""/227, 0xe3}, {&(0x7f0000005600)=""/200, 0xc8}, {&(0x7f0000005700)=""/20, 0x14}], 0xa, &(0x7f0000005800)=""/94, 0x5e}, 0xae3}, {{&(0x7f0000005880)=@isdn, 0x80, &(0x7f0000005d80)=[{&(0x7f0000005900)=""/247, 0xf7}, {&(0x7f0000005a00)=""/228, 0xe4}, {&(0x7f0000005b00)=""/186, 0xba}, {&(0x7f0000005bc0)=""/56, 0x38}, {&(0x7f0000005c00)=""/5, 0x5}, {&(0x7f0000005c40)=""/67, 0x43}, {&(0x7f0000005cc0)=""/188, 0xbc}], 0x7, &(0x7f0000005e00)=""/4096, 0x1000}, 0x80}, {{&(0x7f0000006e00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000006f00)=[{&(0x7f0000006e80)=""/53, 0x35}, {&(0x7f0000006ec0)=""/7, 0x7}], 0x2, &(0x7f0000006f40)=""/137, 0x89}, 0x1f}], 0x8, 0x18040, &(0x7f0000007240)={r32, r33+10000000}) r35 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r35, 0x0, 0x0, 0x0) getpeername$packet(r35, &(0x7f0000007280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000072c0)=0x14) r37 = socket$nl_route(0x10, 0x3, 0x0) r38 = socket$netlink(0x10, 0x3, 0x0) r39 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r39, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r39, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r38, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r40, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r37, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r40, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r40, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r41 = socket$nl_route(0x10, 0x3, 0x0) r42 = socket$netlink(0x10, 0x3, 0x0) r43 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r43, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r43, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r44, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r41, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r44, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r44, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000007300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007340)=0x14, 0x0) r46 = socket$nl_route(0x10, 0x3, 0x0) r47 = socket$netlink(0x10, 0x3, 0x0) r48 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r48, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r48, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r47, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r49, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r46, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r49, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r49, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007540)=0x14) r51 = socket$nl_route(0x10, 0x3, 0x0) r52 = socket$netlink(0x10, 0x3, 0x0) r53 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r53, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r53, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r52, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r54, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r51, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r54, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r54, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r6, &(0x7f0000007b00)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000007ac0)={&(0x7f0000007580)={0x508, r8, 0x5b199c07e760dbb9, 0x70bd26, 0x25dfdbfc, {}, [{{0x8, 0x1, r10}, {0x178, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x300000}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r21}, {0x1ac, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xfffffeac}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r31}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r34}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8, 0x1, r36}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r40}}}]}}, {{0x8, 0x1, r44}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r45}, {0x128, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r49}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r50}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3c0f90a9}}, {0x8, 0x6, r54}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x9, 0x2, 0x1, 0x3a}, {0x7, 0x1f, 0x5, 0x4}, {0xfffc, 0x1, 0x4, 0x3}, {0x5bca, 0x4, 0x89, 0x2}, {0x0, 0x5, 0x4, 0x7ff}, {0x101, 0x81, 0x2, 0x292e8964}, {0xfffa, 0x1, 0x0, 0x7fffffff}]}}}]}}]}, 0x508}, 0x1, 0x0, 0x0, 0x2400c004}, 0x4000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0x0, 0x0}, 0x10) 14:39:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x4, @empty, 'ip6_vti0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x0) 14:39:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8a00}, 0x0) 14:39:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8b00}, 0x0) 14:39:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:27 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r4 = getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r4, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) fcntl$setown(r3, 0x8, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xd6, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='syzkaller\x00', 0xfffe, 0xb7, &(0x7f00000002c0)=""/183, 0x40f00, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x4, 0x20007}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0x0, 0x0}, 0x10) 14:39:27 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:27 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000140)) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) sendmsg$IPCTNL_MSG_EXP_GET(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x4011}, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e20, @multicast2}], 0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6}, 0x8) connect$inet6(r3, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x3}, 0x12d48122) 14:39:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8c00}, 0x0) 14:39:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x8) 14:39:27 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat(r5, &(0x7f0000000180)='./file0\x00', 0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r10, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000f80)=@newchain={0x41c, 0x64, 0x4, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r10, {0x10, 0xffe0}, {0xa, 0x10}, {0x0, 0xe}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x204, 0x2, [@TCA_CGROUP_EMATCHES={0x15c, 0x3, [@TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0xc63a, 0x7, 0x1}, {{0x4, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}}}}, @TCA_EMATCH_TREE_LIST={0xe0, 0x2, @TCF_EM_IPT={0xdc, 0x1, 0x0, 0x0, {{0x2, 0x9, 0x6}, [@TCA_EM_IPT_MATCH_DATA={0xcf, 0x5, "1b8a23a2f123abacde76ea9ef7c5f1fd69925cb00c4b2914a5d7d0da9f188a3775a779386b1ae50735581e672759f3f97e2b39155ad7e118c082e178248fba9b54a516662f410e290806d49524f3239c3f0b4242cc66c6536b8162acd645029cbdebf9c9d9b8e7090f2939d28a90f3178e448c0983c81b0c483ea80d2d6aa36adacfcc3767103dd581f5289af6f1a9328da1d5c312dbaa81b8258a9cbc317ce10a95cfe577436208811dcedb6a8e95a77e0875ed3f4eb970252a30829d258abb7d5ea69911e9befda61538"}]}}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x7, 0x1, 0x7fff}, {0x9, 0x7, 0x6, 0x5, 0xa, 0x1, 0x2}}}}, @TCA_EMATCH_TREE_LIST={0x3c, 0x2, @TCF_EM_META={0x38, 0x2, 0x0, 0x0, {{0x259, 0x4, 0x401}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x9, 0xcd, 0x1}, {0x8, 0x4, 0x1}}}, @TCA_EM_META_RVALUE={0x12, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="3218", @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0xa]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x1}, {0xfc00, 0x81}}}]}}}]}, @TCA_CGROUP_ACT={0x30, 0x1, @m_skbmod={0x2c, 0x1a, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x4}, {0x17, 0x6, "63327e350a5b4ccf30f8acd6b3171b46f75c1c"}}}}, @TCA_CGROUP_EMATCHES={0x74, 0x3, [@TCA_EMATCH_TREE_LIST={0x1c, 0x2, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x9, 0x1, 0x5}, {0x8877, 0x1, 0x3f, 0x7, 0x7, 0x1, 0x2}}}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x3, 0x7, 0x9c6}, {{0x3, 0x1, 0x0, 0x1}, {0x4}}}}}, @TCA_EMATCH_TREE_LIST={0x14, 0x2, @TCF_EM_IPSET={0x10, 0x3fc0, 0x0, 0x0, {{0x1, 0x8, 0x8}, {0x2, 0x0, 0x2}}}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xf8b3}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x1ff, 0x7, 0xab5c}, {{0x2, 0x1}, {0x1}}}}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}]}]}}, @TCA_RATE={0x6, 0x5, {0x7, 0x1}}, @TCA_CHAIN={0x8, 0xb, 0xc}, @filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x1cc, 0x2, [@TCA_CGROUP_EMATCHES={0x1c8, 0x3, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xb1}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x800}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8}}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x101, 0x1, 0x4}, {0x5, 0x9, 0x30, 0x1, 0x4, 0x0, 0x1}}}}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x8000, 0x1, 0x7}, {0x0, 0x200, 0x3f, 0x4, 0xd, 0x0, 0x1}}}}, @TCA_EMATCH_TREE_LIST={0x108, 0x2, @TCF_EM_CONTAINER={0x104, 0x3, 0x0, 0x0, {{0x1f, 0x0, 0x80}, "cf00a9b6dc920790dcfba13578658b62f3cd8c14eccba102f613737e5cec27d3f3d94fa39558d8e6f615d86c84336a5e15b3977b813ee01fee7a0b45206faaedb94f7ec9543d909d5876b4e85292d58628bc5b7c81ede8f48eb2eb193950d9b9f35e43659bdd4561dde976900ebc5921ac57967e907b99783b4b70ad55145fb60419db996d23181d6bc9f7fe24fa775b8e0f377b6bfa3b77a3afc7f6f33c0177374139281dc7317be2df1d7990cbcbec1005cf0ec6ba71167925530dd5762e11ec2134ae7e523a29d6c987144a72dc70fc8609e0aa954ca7736fc9da401dea417a1326acfd3b7ab07aac185708e44f9999879a98a295be"}}}, @TCA_EMATCH_TREE_LIST={0x54, 0x2, @TCF_EM_IPT={0x50, 0x1, 0x0, 0x0, {{0x5, 0x9, 0x81}, [@TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x81}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_DATA={0x23, 0x5, "cdb071bbe621067e46fba0ae6a77e712148f58a132a1a96d2700cbf5b2f625"}]}}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x9, 0x7, 0x401}, {{0x2, 0x1, 0x0, 0x1}, {0x2, 0x1}}}}}]}]}}]}, 0x41c}, 0x1, 0x0, 0x0, 0x2}, 0x880) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r11, 0x0, 0x0}, 0x10) 14:39:27 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8d00}, 0x0) 14:39:27 executing program 1: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) geteuid() accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r3, 0xba, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000200)='/dev/vcsu#\x00', 0x6, 0xa81) r4 = socket(0x1000000010, 0x80003, 0x0) write(r4, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000040)={0x0, 'batadv0\x00', {}, 0x3f}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) r6 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0xfffffffd, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}}}, &(0x7f0000000580)=0xffd6) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) stat(&(0x7f00000004c0)='./file0\x00', 0x0) r11 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x1f, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r11, 0xc4c85512, &(0x7f0000000080)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) memfd_create(0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 14:39:27 executing program 4: r0 = memfd_create(&(0x7f0000000100)='#\x00', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') socket(0x3, 0x3, 0x2) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) sendmmsg(r2, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000004c0)="96da0494d3e7a0886586f9c4c5ca7819f778fd0d3e6a91347a5c3ab9e2a966b3ec4ed8923f31c88d13ab232b42d051f9a2666be7ea69aa74", 0x38}], 0x1, &(0x7f0000001040)=[{0xa0, 0x104, 0xcc3, "9a1a1950f62524cede193e3944719481862c788bac88c67c2ff790bd758eb67d81feeede733995f0a68841b42e58b9aa9cb0789e72c1d279431e77b53fc962aa2837fb2664b91e9e65ad618d49a04aa9966fe26bbb2fdf1f106b8af6c84e2cf04512e19224b787d28ba8f074c67d47f9833cd58f46e6d0166829e116248abdfc5aa732de2e6198479a64641b50b7"}, {0xf0, 0x6, 0x7, "5bf1a643bf0dca168d3e5bc2954d6f13c025a1247ca9fc8618a5a740d0b4d166139104670e5d4b7e7b97307e05e953a438e6052aab3fbad92939a27b0d3e9a1c7f3ad2f2d829706a3335b948ad40bc96b191a1a32c66635b8bbc6ea73f5019f9a9e2a14fc8a68fcdbcc73e2c010ff36e930a2c414e8450648b932fd8fe8d41a38fe325667332adc02af0ae9b8eea0f6ca759d80850921d24e6cf997bf6d0f639d83673e97501b8c3c573d734d393f59e123395536ec893a3c01c15152e7f3fccbc47c9a3425c4931b7388e9134d115a5c38f182f4ce8582372ca3d6080"}, {0xf0, 0x0, 0x10001, "2aff834327304f839c7aedf7cce53aa70bea1cacf70138f28dafb524d1e6a4d46f5671ffb4fe5b416fc2ee0bbd871941e8c5528b9fa9b89d316175b86b7e11f921c7a10e8958f6ecca2390337d872417c4043ca0f5402faea59c8e16cdea5761f30e9cc30f1df4f453a740877353bf3d402e9cd6bdcb8acf4b369fcd3aab06dae320b045b46a6ea86a76d7708d02e030e284992451478949989f0028ef0db6ea8557f4a276a6391c8df163d00566271d65a99144f49efbba7fec173a182030d009fadc4b48c998a0441e5d531f76a77fd86c55c604e4b52fb8e463ea03"}, {0x110, 0x88, 0x1000, "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"}, {0xf8, 0x10f, 0x17, "c2edb16b997cf6dd010b60f440c29708c00ccb53262a67f59e755c9d20db274ca8badca080905084cc5bcf9240a7a657e1fc8a9c053ab4b2a7034dc0824bfd372a87b960ce159652adaff85c549f9f31b5a2480fe4b684979edffbb173955a20976983fba5f972169d7024cf0ec573422c4e52f335b82f245d9abbd714002b21ecb6654f2a9f712f6842c8e5bd2bf82605118f17c9ea682de9a78aa324d66bcbc9c4eb8d6393fe6fbd10e6271ec7dcb9e57423327bbd0d0748233d0501bbdf23427c9c017ec3a6a5260cded8172a3a2a29fe2ac4745030877a1b30073de000adda8b"}, {0x108, 0x10b, 0x4, "5229a44e8f0eeff6ef96d3eaddf118047305c31d15f35729bfad42bc105e5c2322f5f252671ae254e140b6136bf26f30f9a6e9b46d699d1047c52622748a8d96b5400cf856a39727e84a29f0c9ebb823b2b64f262f4d5250a0e9efe36b8b6738c3d97abc109793f4b31c327d4c2ebd0d33326efe6179de630a32fb21ebeb6db9b5d96f7c81411a1e11518f5bfbb9af14b29f339797f4c09709d52c9d1eaf5473318a0f9cc41e053b19c0065783833a1e5438a80cdde02331f69df930fa4e33c8dad3a397ee44aef5a0d5c75efd6338d92783c92a889582ac111b7e2dd5286a58f57b9dab6ce5af3a3bba9f3ab8e7f8232c"}, {0x38, 0x107, 0x55, "11827e5ac7c1ff45dd505dcae5283acb0a7646bb13ee50d0b3ff540d0a14d297af764c"}, {0xc8, 0x117, 0x6, "2db20cd3a99b06eb2ce2e0677f159174662a02ebbcfc726941468b1bc06f11d314b37f98a30c3429ecfa3607dec38c2bbda4315dd2bc069fe9bfe435bbb70a1461ae3f65be4f732bbb3da9c2032d71aafa3389ac23fdcfcb3b2e0a2dcc048d7227999748888e94dc2518375de19bae61d65cb7cb4cefbc58f714942291c5d1bd88d3a16c6fd7bf2fc23a247d7fd450b012b4067be08fbdf46a5daf25ef08e87b34970ff500a65d35f33b01724053ef12eb65cf223247"}], 0x690}}], 0x1, 0x1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000180)={0x3, 'bridge_slave_1\x00', {0x9}, 0x8}) write$nbd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x3c6) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="40000000000025000400000005002c00000000000000280000000000d4040000006ebd451a22dec4c83108206624ca7a4f9d38e16565a16eb68ca2227b28aa5a5282ff43ba0c2b77d868c0757da79288e04d05da00f45ebf460b26bbc8ff1a1aecab81fe6d383a064ea312ba66db4ce4948913585fc97ed370ddb2a3acadc69287b2e940eb689162949f0e102da9edd02e3913d84945b63c470000000000003d5e1e904c000000000000000000dea589cc0a9f9257a7c96663f4eb30be1c4672b8f2"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x9e6d4f2af01efef}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UFFDIO_COPY(r5, 0xc028aa03, &(0x7f00000001c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000001000/0x3000)=nil, 0x1000, 0x1}) r6 = socket$netlink(0x10, 0x3, 0x4) writev(r6, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r7 = socket$netlink(0x10, 0x3, 0x4) r8 = socket$netlink(0x10, 0x3, 0x4) writev(r8, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) writev(r8, &(0x7f0000000640)=[{&(0x7f0000000580)="480000001400190d09004beafd0d00000284ed7a80ffe006000e11a25bd6787a0526d028e8b30000000000000020d2661f0101ff000000c709285cff61d235d9d9acea087c80cd0d950d4f0000000000000000000900004632f2fadc73171bd2fe9fd50c9c2eb0787c89f636d8777c0825fecd5a5f159a954a6145c1cabcfeb33b5e7b644cd1720d9b88e044657d23578c16e56d27bd6626f8dd1ca4b87f", 0x9e}], 0x1) fcntl$dupfd(r6, 0x0, r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c7cf7001000110800"/20, @ANYRES32=r9, @ANYBLOB="00000000000000000c0001000000000000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10) 14:39:27 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8e00}, 0x0) 14:39:27 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={r6, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000180)={r6, 0x70, "4d6feebda6a27ee3ecbfa49142af465d86af4b5503af54db5e7d36845ed0f78d774422f9860e9baf415f4611736d15a56d6d6eb08e6f195adcb55a0852771ef1f8f698d85471b7916a37c04e77a9e430f6aa75d3e16d200fa68f041f521adbfdf5f07c17cba8d8ef9346b6a081a53470"}, &(0x7f0000000200)=0x78) r7 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"/1718], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r8, 0x0, 0x0}, 0x10) 14:39:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x8f00}, 0x0) 14:39:27 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:27 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:28 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) nanosleep(&(0x7f0000000180), &(0x7f00000001c0)) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0x0, 0x0}, 0x10) 14:39:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9000}, 0x0) 14:39:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000340)=""/92, 0x5c, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9100}, 0x0) 14:39:28 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f00000001c0)=0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x2, &(0x7f00000015c0)=ANY=[@ANYRESHEX], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00000002c0)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) get_thread_area(&(0x7f0000000040)={0x5, 0x20001000, 0xe1f673461b865d9d, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r4, 0x0, 0x0}, 0x10) 14:39:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x1}, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000000/0x2000)=nil], &(0x7f00000004c0)=[0x1], 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') prctl$PR_GET_FP_MODE(0x2e) 14:39:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x1, 0x18}, 0xc) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r6 = socket$netlink(0x10, 0x3, 0x4) writev(r6, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r7 = socket$netlink(0x10, 0x3, 0x4) writev(r7, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet(0x10, 0x2, 0x0) sendmsg(r9, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f6105000a2800091f000007242808000800084004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 14:39:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000340)=""/92, 0x5c, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9200}, 0x0) 14:39:28 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0x0, 0x0}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000180)={0x0, 0x54, "9166db3dae57ad6e907cd26b577314e3b39fb08d09f3f70500dae7a34bb9dc7592f2a12a01e437298333f19a7047c5baf8016292a2e5c06e688f16dd9a731f5a666121b5a1b1099dde0102bd767ea5408a183088"}) 14:39:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9300}, 0x0) 14:39:28 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xee, 0xee, 0x7, [@datasec={0xc, 0x5, 0x0, 0xf, 0x3, [{0x2, 0x5, 0xae}, {0x3, 0x4, 0x8}, {0x2, 0x3, 0x2}, {0x1, 0x100, 0xa13b}, {0x4, 0xbcf6, 0x7}], "9ad378"}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0x3}, {0x9, 0x3}, {0xd, 0x7}, {0xa, 0x37}, {0x0, 0x6}]}, @const={0xd, 0x0, 0x0, 0xa, 0x5}, @datasec={0x9, 0x4, 0x0, 0xf, 0x3, [{0x5, 0x1f, 0x6312}, {0x2, 0x9a, 0x7fff}, {0x1, 0x8e}, {0x1, 0x8, 0x6}], "e53239"}, @struct={0x9, 0x2, 0x0, 0x4, 0x1, 0x5, [{0x6, 0x2, 0x1}, {0xf, 0x4, 0x3}]}]}, {0x0, [0x30, 0x17, 0x30, 0x30, 0x30]}}, &(0x7f0000000040)=""/62, 0x10f, 0x3e, 0x1}, 0x20) dup3(r0, r1, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/787], &(0x7f00000001c0)='GPL\x00'}, 0x48) 14:39:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000340)=""/92, 0x5c, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 990.218116][ T7901] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 14:39:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9400}, 0x0) 14:39:29 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:29 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x1, 0x680080) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x23c}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x3}, &(0x7f0000000280)=0x8) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000b80)={0x0, 0xe92, 0x200, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0x9a0905, 0x8000, [], @p_u8=&(0x7f0000000380)=0x8}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000c00)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000bc0), 0x39, 0xa}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xd9, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r6, 0x0, 0x0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) r10 = socket$netlink(0x10, 0x3, 0x4) writev(r10, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) fcntl$F_SET_RW_HINT(r10, 0x40c, &(0x7f0000000c40)) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f0000000340)=0x8) 14:39:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9500}, 0x0) 14:39:29 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:30 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)={0x1c, 0x7, 0x6, 0x5cfa570fb475f74b, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x8, 0x5, 0x0, 0x0, {0x5, 0x0, 0x8}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88a2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4005) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/schedstat\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000440)={[0x9, 0xffffffff, 0x1, 0x2, 0x200, 0x7, 0xefbe0000, 0x7, 0x64, 0x2, 0x80000001, 0x401, 0x7, 0x4, 0x3f, 0x77, 0x9, 0x4, 0x8, 0x9, 0x14, 0x5, 0xfffffff9, 0x400, 0x8, 0x800, 0x400, 0x1, 0x9c0, 0x101, 0x9, 0x5, 0x1, 0x7fff, 0x5, 0x8, 0x4, 0x0, 0x4, 0x401, 0x1ff, 0x2, 0x98f8aa80, 0x0, 0x8, 0x51c, 0x800, 0x9, 0xffffffef, 0xd4, 0xfffffffa, 0x80000001, 0x2, 0x6, 0x2, 0x7, 0x6a4, 0x5, 0x7, 0x7, 0x0, 0x5, 0x8, 0x20, 0x7, 0x2, 0x80000001, 0x5, 0x0, 0x1, 0x8, 0x1, 0x1, 0x2, 0x2, 0x7fff, 0x6, 0x302, 0x4, 0x1, 0x9bec, 0x8, 0x80000000, 0x9, 0x8, 0xfff, 0x8001, 0x7f, 0xfff, 0x80, 0x8, 0x3, 0x1, 0xb401, 0x9, 0xfffffffb, 0xa28, 0x1c45, 0x1f, 0x5df, 0x2, 0x80000001, 0x8, 0x96a1, 0x68, 0x7, 0x3f, 0x18000000, 0x0, 0x101, 0x31, 0x7ff, 0x1, 0x80000001, 0x5, 0x3, 0x71, 0x80000001, 0xffffffff, 0x2, 0x3, 0xfffffff8, 0x1, 0xb61, 0x7fff, 0x26, 0xf50c, 0x7, 0x0, 0x7, 0xfffffff8, 0x1, 0x9, 0x81, 0x80, 0x8, 0x1e, 0x0, 0x6, 0x1000, 0x7, 0x9, 0x0, 0x40, 0x2, 0x2, 0x0, 0x1, 0x4, 0x4, 0x8000, 0x3, 0x0, 0x0, 0x3f, 0x401, 0x2, 0x1f, 0xfffff001, 0x1, 0x13597757, 0x2bc6761c, 0x5, 0xdb6, 0x200, 0x0, 0x6, 0x5, 0x8, 0x6, 0x89f1, 0x4, 0x2, 0x1000, 0x8001, 0x7fff, 0xe72, 0x8, 0x3ff, 0x0, 0x7, 0x7, 0xffffffff, 0x200, 0x3, 0x401, 0x3, 0x9, 0x0, 0x5, 0x80000000, 0x7fffffff, 0x0, 0x20, 0x72e, 0x7, 0x80000001, 0x5, 0x3, 0x3, 0x9, 0x3, 0xb57, 0x120000, 0x0, 0x1000, 0x2, 0xf6, 0x3, 0x81, 0xdf91, 0xee4, 0x1, 0x5f, 0x8, 0xcd0, 0x9, 0x5, 0x9, 0x2, 0x7, 0xff, 0x6, 0x8, 0x8001, 0x0, 0x8000, 0x5, 0x3, 0x3ff, 0x80000000, 0xffffffff, 0xff, 0x6, 0xfff, 0x1ff, 0x401, 0x0, 0x3ff, 0x2, 0x8, 0x8, 0x4, 0xff, 0x3ff, 0x1f, 0x3, 0xe1, 0xc5, 0xffffa9af, 0x40, 0x3, 0x8000, 0x22, 0x40, 0x3, 0x6, 0x4, 0x5, 0xffff, 0x6, 0x7, 0x2, 0x1, 0x8, 0x1f, 0x3ff, 0x3479, 0x6, 0x3ff, 0x1f, 0x2, 0x20, 0x20, 0x9, 0x6, 0x4, 0x5, 0x0, 0x2, 0x401, 0x0, 0x3, 0xffff, 0x40, 0x7f, 0x4, 0x3, 0x7, 0xcef, 0x1, 0x5, 0xfffffff8, 0xffffffff, 0x5, 0x0, 0x18dc, 0x4, 0x7fffffff, 0x5, 0x8, 0x7000, 0xff, 0x5, 0x100, 0x71, 0x2, 0xffffffe8, 0x3, 0x8, 0x5, 0x80000000, 0x6, 0xffff, 0x400, 0x1b9, 0xed, 0x0, 0x8, 0x3, 0x9, 0xfffffff7, 0x9, 0x64c1, 0x7f, 0x6, 0x2, 0x8, 0x4, 0xff, 0xcc, 0x7, 0xb59c, 0x100, 0xae9b, 0xffff7583, 0x4529, 0x8000, 0x9, 0x9, 0x1d047d36, 0xc07, 0xfffffffb, 0x2, 0xb04, 0x0, 0x81, 0x1ee175c0, 0x12c, 0x1f, 0x50, 0x7, 0x7fffffff, 0x8bd, 0x1, 0x5, 0x40, 0x3, 0xb6, 0x20, 0xfffffeff, 0xaaa000, 0x400, 0x3, 0x7, 0x0, 0x5, 0x8001, 0x5, 0x0, 0x81, 0x400, 0x80000001, 0x7, 0x1, 0xaae, 0x81, 0x6, 0x1, 0xffffffff, 0xfffffffc, 0x1, 0x58, 0x9, 0x0, 0x3, 0x1000, 0x5b, 0x4e3, 0xa3b0, 0x1c0000, 0x2, 0x9, 0xa6, 0x7, 0x3, 0x7fffffff, 0x5, 0xffffffc0, 0x8, 0x6, 0x10000, 0x0, 0x3f, 0x9, 0xc55, 0x7fff, 0x4, 0x1, 0x7, 0xfffffc3b, 0x2, 0x5, 0x38, 0x5, 0xf41, 0x8000, 0x5, 0x100, 0xeb, 0x2, 0x1, 0x7, 0x7fffffff, 0x8, 0x8, 0x1, 0x40, 0x80000000, 0x2, 0x7, 0x5, 0xc9ff, 0x0, 0x6, 0xfffffffd, 0x42a68919, 0x101, 0x763, 0x8, 0x4, 0x4, 0x3, 0x1000, 0x3ff, 0xd2e, 0x8, 0x4, 0x200, 0x7d2, 0x800, 0x3, 0xffff7194, 0x5, 0x258, 0x2, 0x7, 0x0, 0x9, 0x800, 0x40008, 0x9, 0x3, 0x1, 0x8001, 0x7fffffff, 0xbd9c, 0x401, 0x6, 0xf58b, 0x7, 0x1, 0x9, 0x7, 0x2, 0x8000, 0xffffffff, 0xfffffffe, 0x5, 0x0, 0x8, 0x0, 0x7ff, 0x2, 0x5, 0x0, 0x2, 0xfff, 0x6a4, 0x5, 0x3, 0xfffffffb, 0x10000, 0x40, 0x3a89, 0x9, 0x20, 0x5, 0x100, 0x9, 0x400, 0x9, 0x81, 0x7, 0x5, 0xb98, 0x8, 0x800, 0xf, 0x6, 0x101, 0x9, 0xcf3, 0xe72, 0x3, 0x4, 0xffffffff, 0x80000000, 0xffff, 0xf3b, 0x747c873e, 0x0, 0x0, 0x81, 0x9, 0x1f, 0x4, 0xfff, 0x1, 0x6, 0xfffffffb, 0x81, 0x10001, 0x3, 0x3427976, 0x9, 0xfffff801, 0x7, 0x1be, 0x5c, 0x9, 0x1f, 0x1000, 0xfff, 0x80000001, 0x100, 0x5, 0x1, 0x4, 0x2c, 0x7ff, 0x10001, 0x5, 0x1, 0x9, 0x4, 0x101, 0x1, 0x800, 0x80000000, 0x4, 0x4, 0x3f, 0x3f, 0x0, 0x64, 0x1, 0x200, 0x95, 0x5, 0xd333, 0xfec3, 0x6, 0x6ef, 0x8, 0xfffffffd, 0x1, 0xb22, 0x800, 0xfffffffa, 0x4, 0x7, 0x429, 0x3, 0x5, 0x2, 0x1, 0x7, 0x5, 0x22d, 0x8, 0x3, 0x9, 0x8, 0x2, 0xbf3, 0x1000, 0xfffffff7, 0x6, 0x8001, 0x401, 0x3, 0x8b44, 0x2, 0x7, 0x0, 0x8, 0x3, 0x3, 0x6, 0x400, 0xfffffff8, 0x5, 0x92, 0x6, 0x400, 0x2, 0x1, 0x0, 0x6, 0x8, 0x8001, 0x6, 0x7f, 0x664b931f, 0x9, 0x3, 0x3f, 0x20, 0x3, 0x6, 0x7, 0x1ff, 0x8947, 0x40000000, 0x1, 0x7, 0x2, 0x7, 0xfd5, 0x2, 0x2, 0xed6, 0x3ff, 0x7fff, 0x3ff, 0x7ff, 0xb13, 0xb5, 0x2, 0x10000, 0x2, 0x80000001, 0x80000001, 0x7fffffff, 0x7, 0x9, 0xffff, 0x0, 0x9, 0x1, 0x0, 0x7f, 0x1, 0x2, 0xfffffbff, 0xfe, 0xdc, 0x1, 0x3, 0x8000, 0x0, 0x2, 0xe93, 0x8, 0x1ff, 0x8001, 0x80000000, 0x4, 0x1, 0x0, 0x7ff, 0x401, 0x0, 0x5, 0xffff, 0xffff, 0x81, 0x5, 0x2, 0x101, 0xffffffff, 0x0, 0xfffffffb, 0x1, 0x7f, 0x3, 0x2, 0x6, 0x2, 0x5, 0x6, 0x5, 0x2b, 0x6, 0x2, 0x1000, 0x5fb17d44, 0x10000, 0x0, 0x27c68813, 0x0, 0x4, 0x81, 0x4, 0x7ff, 0xbd, 0x7, 0x5, 0x7f, 0x5, 0x58, 0x7, 0x7, 0x9, 0xfffffffe, 0x2, 0x7f, 0x80000001, 0x601, 0x2, 0x3e7, 0x2, 0x80000001, 0xe2d, 0x9321, 0x5, 0xc0, 0x950, 0x400, 0x2, 0x0, 0x1, 0x1, 0x4, 0x3, 0x7, 0x36, 0x1, 0x7f, 0x8, 0x5e, 0x0, 0x3, 0x7, 0x582, 0x0, 0x8001, 0x4, 0x7fffffff, 0x9, 0x2, 0x3, 0x2, 0x1, 0x800, 0x0, 0x64c31575, 0x7716, 0x9f, 0x7, 0x9, 0x7, 0x5, 0x5, 0xfffffffa, 0x80f, 0x7fff, 0x200, 0x3, 0xa6c3, 0x47, 0x0, 0x1, 0x89, 0x2, 0x82d8, 0x3, 0x5, 0xffffffff, 0x2, 0x9, 0x2, 0x1c, 0x9, 0x4, 0x4, 0x9, 0x7, 0x5, 0x6, 0xffff8001, 0x2, 0x4, 0x7, 0x9, 0x5, 0x3, 0x9, 0x459, 0x98ce, 0x80, 0x80000000, 0x7fffffff, 0x81, 0x8, 0x0, 0x3, 0x3, 0x4, 0x6, 0x2000, 0x3001f25f, 0x100, 0x1ff, 0x6, 0x401, 0x6, 0x3174, 0x7fffffff, 0x1, 0x1f, 0xb8cd, 0xffff, 0x7ff, 0x0, 0x1, 0x0, 0x7fffffff, 0x8, 0x80000001, 0x7, 0x0, 0x3ff, 0x7, 0xb9b, 0x8, 0x4e94b1d, 0x1, 0x80000000, 0x9039, 0x85, 0x767, 0x8001, 0x9, 0x0, 0x0, 0x8, 0x8, 0xd3, 0x7, 0x5, 0x5, 0x8, 0x0, 0x5, 0x51f, 0x1, 0x9, 0xfffffe00, 0x6, 0x7, 0x3f, 0x9, 0x3f, 0xa3fa, 0x4, 0x100, 0x9, 0x4, 0x9, 0x401, 0x4, 0xee, 0x40, 0x0, 0x400, 0x40, 0x1, 0x560a, 0x6, 0x2d9, 0x800, 0x100, 0x0, 0x90, 0x1, 0x1, 0x3f, 0x5, 0x415, 0xff, 0x20, 0x3ff, 0x1, 0x6, 0x42bc4513, 0x1, 0x9, 0x80000000, 0x26e, 0x400, 0x78e, 0x800, 0x0, 0x4a000000, 0x0, 0x3f, 0x6, 0x1a81, 0x0, 0x1, 0xd2, 0xfffffff8, 0xffff, 0x3, 0xf82c, 0x7, 0x6a54e537, 0x0, 0x38, 0xffffff37, 0x2, 0x1, 0x4b15, 0xfffffffa, 0xe0000000, 0xfffff482, 0x5, 0x4, 0x86, 0x2, 0x1, 0x74, 0xf4, 0x2, 0x4, 0x5, 0x2, 0x3ff, 0x8, 0x5, 0x1, 0x4, 0x65c51c93, 0xfffff4ef, 0x6, 0x5, 0x4, 0x6, 0x7f, 0x50, 0x2, 0x6, 0x40, 0x7ff, 0x1ff, 0x10001, 0x1, 0x80000001, 0x7, 0x3, 0x200, 0x2, 0x8, 0xa8, 0x1, 0x3, 0x5, 0x2e1, 0x3, 0x7ff, 0xffffffff, 0x1, 0x0, 0x6, 0x3, 0x9, 0x5, 0xffffffff, 0x3, 0xb, 0x2, 0x3d, 0x7fff, 0x401, 0x3, 0xffff0000, 0x4, 0xfffffff8, 0xd32, 0x3, 0xd420, 0x2, 0x1, 0x800, 0xffffffff, 0x1000, 0x7, 0x0, 0x1, 0x0, 0x80000000, 0x100, 0xfffffffa, 0x6, 0x101, 0x9, 0x80, 0x81, 0x8000, 0xd9, 0x6ddb, 0x7fff]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0x0, 0x0}, 0x10) r6 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r6, 0x8818564c, &(0x7f0000001c80)) 14:39:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000001fc0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000002080)={&(0x7f0000001f80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002040)={&(0x7f0000002000)={0x30, r4, 0x100, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x24040040}, 0x40800) r5 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$l2tp6(r5, &(0x7f0000000180)="ce684c6daf10306c374526e52b892c6b8a46317ecdb5c680ed4a4cafa304e61095dd075741ad8fce9cb9ddb59aecd6efc0a1df2487f5f6014234783cc4fca49af29c195107deb7d44c46d0926f01df172980cb56e50cf4d8ed21a04955e118d83cc8b5264c33d94cf211c83cca7ba94d40fc215a92a9bdf122d218b61b3f74d07e8e2685728e9bb9180fc0f6bc24a24a1eca046759b97965bcfdb9373ca54ef42bf41bc2af6ddfe6fece049fb6ddcf58f585fded704006fb599d6061c0c225c81dd4e00ab671", 0xc6, 0x8c0, &(0x7f0000000040)={0xa, 0x0, 0x1, @rand_addr="34ecbbb3f84c1c1c6c9d86ed3d948c19", 0x4, 0x2}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c00000010000400"/20, @ANYRES32=0x0, @ANYBLOB="00000000100000001c0012000b00010067656e65766500000c00020008000b4000010001"], 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x40080, 0x0) ioctl$UI_SET_RELBIT(r10, 0x40045566, 0xb) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000100)=0x3, 0x4) io_uring_enter(r9, 0xffffa8ae, 0x80, 0x3, &(0x7f00000000c0)={[0x20]}, 0x8) 14:39:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9600}, 0x0) 14:39:30 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20400, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f0000000100)=""/181) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0xfffff600}, &(0x7f0000000300)=0x8) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x7, 0x4, 0x9232, 0x1, r7}, 0x10) sendto$inet6(r2, 0x0, 0x0, 0x30002000, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup2(r9, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$TIPC_NODE_RECVQ_DEPTH(r10, 0x10f, 0x83, &(0x7f0000000080), &(0x7f0000000280)=0x4) 14:39:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9700}, 0x0) 14:39:30 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, 0x0, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:30 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept4(r0, 0x0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r7) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:39:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9800}, 0x0) 14:39:30 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0x0, 0x0}, 0x10) 14:39:30 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, 0x0, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:30 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)={0x1c, 0x7, 0x6, 0x5cfa570fb475f74b, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x8, 0x5, 0x0, 0x0, {0x5, 0x0, 0x8}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88a2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4005) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/schedstat\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000440)={[0x9, 0xffffffff, 0x1, 0x2, 0x200, 0x7, 0xefbe0000, 0x7, 0x64, 0x2, 0x80000001, 0x401, 0x7, 0x4, 0x3f, 0x77, 0x9, 0x4, 0x8, 0x9, 0x14, 0x5, 0xfffffff9, 0x400, 0x8, 0x800, 0x400, 0x1, 0x9c0, 0x101, 0x9, 0x5, 0x1, 0x7fff, 0x5, 0x8, 0x4, 0x0, 0x4, 0x401, 0x1ff, 0x2, 0x98f8aa80, 0x0, 0x8, 0x51c, 0x800, 0x9, 0xffffffef, 0xd4, 0xfffffffa, 0x80000001, 0x2, 0x6, 0x2, 0x7, 0x6a4, 0x5, 0x7, 0x7, 0x0, 0x5, 0x8, 0x20, 0x7, 0x2, 0x80000001, 0x5, 0x0, 0x1, 0x8, 0x1, 0x1, 0x2, 0x2, 0x7fff, 0x6, 0x302, 0x4, 0x1, 0x9bec, 0x8, 0x80000000, 0x9, 0x8, 0xfff, 0x8001, 0x7f, 0xfff, 0x80, 0x8, 0x3, 0x1, 0xb401, 0x9, 0xfffffffb, 0xa28, 0x1c45, 0x1f, 0x5df, 0x2, 0x80000001, 0x8, 0x96a1, 0x68, 0x7, 0x3f, 0x18000000, 0x0, 0x101, 0x31, 0x7ff, 0x1, 0x80000001, 0x5, 0x3, 0x71, 0x80000001, 0xffffffff, 0x2, 0x3, 0xfffffff8, 0x1, 0xb61, 0x7fff, 0x26, 0xf50c, 0x7, 0x0, 0x7, 0xfffffff8, 0x1, 0x9, 0x81, 0x80, 0x8, 0x1e, 0x0, 0x6, 0x1000, 0x7, 0x9, 0x0, 0x40, 0x2, 0x2, 0x0, 0x1, 0x4, 0x4, 0x8000, 0x3, 0x0, 0x0, 0x3f, 0x401, 0x2, 0x1f, 0xfffff001, 0x1, 0x13597757, 0x2bc6761c, 0x5, 0xdb6, 0x200, 0x0, 0x6, 0x5, 0x8, 0x6, 0x89f1, 0x4, 0x2, 0x1000, 0x8001, 0x7fff, 0xe72, 0x8, 0x3ff, 0x0, 0x7, 0x7, 0xffffffff, 0x200, 0x3, 0x401, 0x3, 0x9, 0x0, 0x5, 0x80000000, 0x7fffffff, 0x0, 0x20, 0x72e, 0x7, 0x80000001, 0x5, 0x3, 0x3, 0x9, 0x3, 0xb57, 0x120000, 0x0, 0x1000, 0x2, 0xf6, 0x3, 0x81, 0xdf91, 0xee4, 0x1, 0x5f, 0x8, 0xcd0, 0x9, 0x5, 0x9, 0x2, 0x7, 0xff, 0x6, 0x8, 0x8001, 0x0, 0x8000, 0x5, 0x3, 0x3ff, 0x80000000, 0xffffffff, 0xff, 0x6, 0xfff, 0x1ff, 0x401, 0x0, 0x3ff, 0x2, 0x8, 0x8, 0x4, 0xff, 0x3ff, 0x1f, 0x3, 0xe1, 0xc5, 0xffffa9af, 0x40, 0x3, 0x8000, 0x22, 0x40, 0x3, 0x6, 0x4, 0x5, 0xffff, 0x6, 0x7, 0x2, 0x1, 0x8, 0x1f, 0x3ff, 0x3479, 0x6, 0x3ff, 0x1f, 0x2, 0x20, 0x20, 0x9, 0x6, 0x4, 0x5, 0x0, 0x2, 0x401, 0x0, 0x3, 0xffff, 0x40, 0x7f, 0x4, 0x3, 0x7, 0xcef, 0x1, 0x5, 0xfffffff8, 0xffffffff, 0x5, 0x0, 0x18dc, 0x4, 0x7fffffff, 0x5, 0x8, 0x7000, 0xff, 0x5, 0x100, 0x71, 0x2, 0xffffffe8, 0x3, 0x8, 0x5, 0x80000000, 0x6, 0xffff, 0x400, 0x1b9, 0xed, 0x0, 0x8, 0x3, 0x9, 0xfffffff7, 0x9, 0x64c1, 0x7f, 0x6, 0x2, 0x8, 0x4, 0xff, 0xcc, 0x7, 0xb59c, 0x100, 0xae9b, 0xffff7583, 0x4529, 0x8000, 0x9, 0x9, 0x1d047d36, 0xc07, 0xfffffffb, 0x2, 0xb04, 0x0, 0x81, 0x1ee175c0, 0x12c, 0x1f, 0x50, 0x7, 0x7fffffff, 0x8bd, 0x1, 0x5, 0x40, 0x3, 0xb6, 0x20, 0xfffffeff, 0xaaa000, 0x400, 0x3, 0x7, 0x0, 0x5, 0x8001, 0x5, 0x0, 0x81, 0x400, 0x80000001, 0x7, 0x1, 0xaae, 0x81, 0x6, 0x1, 0xffffffff, 0xfffffffc, 0x1, 0x58, 0x9, 0x0, 0x3, 0x1000, 0x5b, 0x4e3, 0xa3b0, 0x1c0000, 0x2, 0x9, 0xa6, 0x7, 0x3, 0x7fffffff, 0x5, 0xffffffc0, 0x8, 0x6, 0x10000, 0x0, 0x3f, 0x9, 0xc55, 0x7fff, 0x4, 0x1, 0x7, 0xfffffc3b, 0x2, 0x5, 0x38, 0x5, 0xf41, 0x8000, 0x5, 0x100, 0xeb, 0x2, 0x1, 0x7, 0x7fffffff, 0x8, 0x8, 0x1, 0x40, 0x80000000, 0x2, 0x7, 0x5, 0xc9ff, 0x0, 0x6, 0xfffffffd, 0x42a68919, 0x101, 0x763, 0x8, 0x4, 0x4, 0x3, 0x1000, 0x3ff, 0xd2e, 0x8, 0x4, 0x200, 0x7d2, 0x800, 0x3, 0xffff7194, 0x5, 0x258, 0x2, 0x7, 0x0, 0x9, 0x800, 0x40008, 0x9, 0x3, 0x1, 0x8001, 0x7fffffff, 0xbd9c, 0x401, 0x6, 0xf58b, 0x7, 0x1, 0x9, 0x7, 0x2, 0x8000, 0xffffffff, 0xfffffffe, 0x5, 0x0, 0x8, 0x0, 0x7ff, 0x2, 0x5, 0x0, 0x2, 0xfff, 0x6a4, 0x5, 0x3, 0xfffffffb, 0x10000, 0x40, 0x3a89, 0x9, 0x20, 0x5, 0x100, 0x9, 0x400, 0x9, 0x81, 0x7, 0x5, 0xb98, 0x8, 0x800, 0xf, 0x6, 0x101, 0x9, 0xcf3, 0xe72, 0x3, 0x4, 0xffffffff, 0x80000000, 0xffff, 0xf3b, 0x747c873e, 0x0, 0x0, 0x81, 0x9, 0x1f, 0x4, 0xfff, 0x1, 0x6, 0xfffffffb, 0x81, 0x10001, 0x3, 0x3427976, 0x9, 0xfffff801, 0x7, 0x1be, 0x5c, 0x9, 0x1f, 0x1000, 0xfff, 0x80000001, 0x100, 0x5, 0x1, 0x4, 0x2c, 0x7ff, 0x10001, 0x5, 0x1, 0x9, 0x4, 0x101, 0x1, 0x800, 0x80000000, 0x4, 0x4, 0x3f, 0x3f, 0x0, 0x64, 0x1, 0x200, 0x95, 0x5, 0xd333, 0xfec3, 0x6, 0x6ef, 0x8, 0xfffffffd, 0x1, 0xb22, 0x800, 0xfffffffa, 0x4, 0x7, 0x429, 0x3, 0x5, 0x2, 0x1, 0x7, 0x5, 0x22d, 0x8, 0x3, 0x9, 0x8, 0x2, 0xbf3, 0x1000, 0xfffffff7, 0x6, 0x8001, 0x401, 0x3, 0x8b44, 0x2, 0x7, 0x0, 0x8, 0x3, 0x3, 0x6, 0x400, 0xfffffff8, 0x5, 0x92, 0x6, 0x400, 0x2, 0x1, 0x0, 0x6, 0x8, 0x8001, 0x6, 0x7f, 0x664b931f, 0x9, 0x3, 0x3f, 0x20, 0x3, 0x6, 0x7, 0x1ff, 0x8947, 0x40000000, 0x1, 0x7, 0x2, 0x7, 0xfd5, 0x2, 0x2, 0xed6, 0x3ff, 0x7fff, 0x3ff, 0x7ff, 0xb13, 0xb5, 0x2, 0x10000, 0x2, 0x80000001, 0x80000001, 0x7fffffff, 0x7, 0x9, 0xffff, 0x0, 0x9, 0x1, 0x0, 0x7f, 0x1, 0x2, 0xfffffbff, 0xfe, 0xdc, 0x1, 0x3, 0x8000, 0x0, 0x2, 0xe93, 0x8, 0x1ff, 0x8001, 0x80000000, 0x4, 0x1, 0x0, 0x7ff, 0x401, 0x0, 0x5, 0xffff, 0xffff, 0x81, 0x5, 0x2, 0x101, 0xffffffff, 0x0, 0xfffffffb, 0x1, 0x7f, 0x3, 0x2, 0x6, 0x2, 0x5, 0x6, 0x5, 0x2b, 0x6, 0x2, 0x1000, 0x5fb17d44, 0x10000, 0x0, 0x27c68813, 0x0, 0x4, 0x81, 0x4, 0x7ff, 0xbd, 0x7, 0x5, 0x7f, 0x5, 0x58, 0x7, 0x7, 0x9, 0xfffffffe, 0x2, 0x7f, 0x80000001, 0x601, 0x2, 0x3e7, 0x2, 0x80000001, 0xe2d, 0x9321, 0x5, 0xc0, 0x950, 0x400, 0x2, 0x0, 0x1, 0x1, 0x4, 0x3, 0x7, 0x36, 0x1, 0x7f, 0x8, 0x5e, 0x0, 0x3, 0x7, 0x582, 0x0, 0x8001, 0x4, 0x7fffffff, 0x9, 0x2, 0x3, 0x2, 0x1, 0x800, 0x0, 0x64c31575, 0x7716, 0x9f, 0x7, 0x9, 0x7, 0x5, 0x5, 0xfffffffa, 0x80f, 0x7fff, 0x200, 0x3, 0xa6c3, 0x47, 0x0, 0x1, 0x89, 0x2, 0x82d8, 0x3, 0x5, 0xffffffff, 0x2, 0x9, 0x2, 0x1c, 0x9, 0x4, 0x4, 0x9, 0x7, 0x5, 0x6, 0xffff8001, 0x2, 0x4, 0x7, 0x9, 0x5, 0x3, 0x9, 0x459, 0x98ce, 0x80, 0x80000000, 0x7fffffff, 0x81, 0x8, 0x0, 0x3, 0x3, 0x4, 0x6, 0x2000, 0x3001f25f, 0x100, 0x1ff, 0x6, 0x401, 0x6, 0x3174, 0x7fffffff, 0x1, 0x1f, 0xb8cd, 0xffff, 0x7ff, 0x0, 0x1, 0x0, 0x7fffffff, 0x8, 0x80000001, 0x7, 0x0, 0x3ff, 0x7, 0xb9b, 0x8, 0x4e94b1d, 0x1, 0x80000000, 0x9039, 0x85, 0x767, 0x8001, 0x9, 0x0, 0x0, 0x8, 0x8, 0xd3, 0x7, 0x5, 0x5, 0x8, 0x0, 0x5, 0x51f, 0x1, 0x9, 0xfffffe00, 0x6, 0x7, 0x3f, 0x9, 0x3f, 0xa3fa, 0x4, 0x100, 0x9, 0x4, 0x9, 0x401, 0x4, 0xee, 0x40, 0x0, 0x400, 0x40, 0x1, 0x560a, 0x6, 0x2d9, 0x800, 0x100, 0x0, 0x90, 0x1, 0x1, 0x3f, 0x5, 0x415, 0xff, 0x20, 0x3ff, 0x1, 0x6, 0x42bc4513, 0x1, 0x9, 0x80000000, 0x26e, 0x400, 0x78e, 0x800, 0x0, 0x4a000000, 0x0, 0x3f, 0x6, 0x1a81, 0x0, 0x1, 0xd2, 0xfffffff8, 0xffff, 0x3, 0xf82c, 0x7, 0x6a54e537, 0x0, 0x38, 0xffffff37, 0x2, 0x1, 0x4b15, 0xfffffffa, 0xe0000000, 0xfffff482, 0x5, 0x4, 0x86, 0x2, 0x1, 0x74, 0xf4, 0x2, 0x4, 0x5, 0x2, 0x3ff, 0x8, 0x5, 0x1, 0x4, 0x65c51c93, 0xfffff4ef, 0x6, 0x5, 0x4, 0x6, 0x7f, 0x50, 0x2, 0x6, 0x40, 0x7ff, 0x1ff, 0x10001, 0x1, 0x80000001, 0x7, 0x3, 0x200, 0x2, 0x8, 0xa8, 0x1, 0x3, 0x5, 0x2e1, 0x3, 0x7ff, 0xffffffff, 0x1, 0x0, 0x6, 0x3, 0x9, 0x5, 0xffffffff, 0x3, 0xb, 0x2, 0x3d, 0x7fff, 0x401, 0x3, 0xffff0000, 0x4, 0xfffffff8, 0xd32, 0x3, 0xd420, 0x2, 0x1, 0x800, 0xffffffff, 0x1000, 0x7, 0x0, 0x1, 0x0, 0x80000000, 0x100, 0xfffffffa, 0x6, 0x101, 0x9, 0x80, 0x81, 0x8000, 0xd9, 0x6ddb, 0x7fff]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef7507020d447d9de49470d52bafd9c4361aad1970bfcb8129a6ef0ba57d7ef97a908829fd3354d6538094d26a9eacb2ae39233f0494050c730cdaee6d1639c8a46f7f20161953d41200205ec903a3083406d3746b10dd8184a31d35194a085ea81f17fb6d4d5e38f35c4cba786884a3b3017e315c08f3c9f80b32e48420765b541b2ac4b93e41437bc31f2e974ec3aa2fd88df59fb261281a5d27a4b50f92af02f254ff31faf90e06a6eadcb3a2c32b93602761f605d79c233c4e9d3a80705c40b5ddcba24012a8f772a7b0eb9c64459d5542ad63d5d93ed38f69d8e24d7372a7176ef7f2673dff79316ed3f07a68cd8eacf038ddb59ebf5f492d19969046556d9298ec36c60fb64939f9635f482ee1531d2aa3bd9acaa772060ac6c6a13fd49059cc7d9c45c6b8e87ea32bdd1ecde70620928d97ea10256b3d86db053e5aa49c3d05ddb75429d04463fb147e09852d06693b68bdb35fae40b9ba433e2f7125050858b9da61dd96399c225c424c2ccd547636bb063473a7815d4cf929747860d5807166baf89e8fd7c7864f35548e538fec8acf6c88ed8cb821428c95f98eedbace40d968a8c002f717f27896bacb0c848eeb530e7cabf5279ab6db8c80a46f1aea633e6ccf8fd21389b1e0cba8a0d5639e4c924b08666bfa69df3fa5a0e24004d2c5aae5ad5684054ab34c580febd3476281a40d99fcd819a17cd395b4c3e44e0280f70204fb5c85257a47ce0db29eb7c8fa9971eedd57eaec5460a75cb9a95ca731fb1a0c605e715c374db4910eaf0c09b8c5d37da754121ea0eb69abf5e089ed1f7392df699389d6ee54949508c29a6df3140d0b603f1a1d7faf608ff1dbaa6bea8b39e90b979477ac4ed3c5da87266fc088667c8efc354b84e47831d84fed7c01e56bfc217f8253d1f8ce58fd92149b308eec10ca80127f101abac8d80e1fb0e98e14952daa0393a8823e7d95303e8f5ab35dbde1ec6d201bd8ab06205cde4cc14df9447906c8568efe7269363d11fbd31e1706f9bc9184bbc8f5289262ff0e6b86c5015e720ff4032d536d463522fe145e1371780a0100010000000000b67b288b47c65ef8364383102c2d339925f27ed5a9881f7aa40982b6b4d76125c82cedd886cd34f54a3f3e84743d42f8b4a5999a0e1935d77f7a6d2c7449129afece0636929e5704b6bb4c2ab9b303f03d91968df461e5975d7a6adfc71549ed64b363f992e22283c3dd78ce6261161628937774dbed79c42bd2ef2aa5dc7a323a996fd6aeff3a8bca2577e831f1db77e789aa983f0c1de249679b60ac0975bcb954bbede81d851bdd1a0a7830962f5c6e4c5a88102171459862b07f4ca9f91f4ce7cb15b3bc2db2e95dacee55645d289b95c62920f506f65361aae1259dfe6e9108b5a9f72f4cefbf85539fff41ba76090907860c08c71a796d2133339eb0282bd9d09c93870b919c4a5423f6ded7cbfc00000008000000000000000000000000a7b38d021b1ecdf1f9353fe520a4b5b8abf4163bd8e3376317a9295d9753fbfc8967fc7f900ced5913f6695de2db49a7275f85d8dfad726a02c3da4ac744835d3507abb66bb7a23d45a5bbc142bd10e2fdd00db4c7e9fa74ce36e0b20f9c4e87a20c6a589f1c0168c896c0c8aad681c73edfe78bf00f8e8a4c6e70630098c133f0e1f92a0d0c1e4b0bf26c31eb33ebe683f973fc3e0aa18f092845d0aaf70ef7921d13ab2706cabe3d650e080826c0de995d37120f7a969219f2258d54ccda50c870726bf374ab2d66f3ed58d13175b781e6cf0f7a7f33e4db27e463900623cff3e635c3e896bed4419981363d11b8297b6b717a3a6942018ec6704b74bedcfb0e871bdff9eabdec8558bae5034d9993ffefe69ce347f33fdba6a9376f54fea892d8039f0f81ea4df88099f44e62fd4e0f46ee5d69a619f48b40dbaf09c008eb7c1a73e2610d4be9c358afb7f437b5dea548f4bb94f4409dba72bada8e39b6f3075bd7c333348ed555cebf480785d9b7ea71386510de844442cfdf50e7ba88d0c31ac0fe985f408d395b49fa19a8087c41e2539cd642bd1ab0c88a4fa78e04c8594942de59576e781fca62875bc919216e8898d1aefc81a244a597d966706f6e692511a4b45503b3c9bfdcfa12a8c1cc40bbe1de89e688ebb064a55d4f4fe00c8483382ead60cbe853a8eff54eb825ce3b07fa05e51f9ffadab3b4000555a3a4326b459f973fb7340ef66a863708fc7626439271e8ba1c871562c9b2dc1b8ba85287aa8dc7486f306a0d0b31bcf8ab9050e1f5dae9773c06dba27a2b3b2a435267877f628bee19254de71c487ba0fd2a04e76f777e5908a4ec621f634f9964ba6c0e372143659828d3"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0x0, 0x0}, 0x10) r6 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r6, 0x8818564c, &(0x7f0000001c80)) 14:39:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9900}, 0x0) 14:39:30 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, 0x0, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:30 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000015c0)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef7507020d447d9de49470d52bafd9c4361aad1970bfcb8129a6ef0ba57d7ef97a908829fd3354d6538094d26a9eacb2ae39233f0494050c730cdaee6d1639c8a46f7f20161953d41200205ec903a3083406d3746b10dd8184a31d35194a085ea81f17fb6d4d5e38f35c4cba786884a3b3017e315c08f3c9f80b32e48420765b541b2ac4b93e41437bc31f2e974ec3aa2fd88df59fb261281a5d27a4b50f92af02f254ff31faf90e06a6eadcb3a2c32b93602761f605d79c233c4e9d3a80705c40b5ddcba24012a8f772a7b0eb9c64459d5542ad63d5d93ed38f69d8e24d7372a7176ef7f2673dff79316ed3f07a68cd8eacf038ddb59ebf5f492d19969046556d9298ec36c60fb64939f9635f482ee1531d2aa3bd9acaa772060ac6c6a13fd49059cc7d9c45c6b8e87ea32bdd1ecde70620928d97ea10256b3d86db053e5aa49c3d05ddb75429d04463fb147e09852d06693b68bdb35fae40b9ba433e2f7125050858b9da61dd96399c225c424c2ccd547636bb063473a7815d4cf929747860d5807166baf89e8fd7c7864f35548e538fec8acf6c88ed8cb821428c95f98eedbace40d968a8c002f717f27896bacb0c848eeb530e7cabf5279ab6db8c80a46f1aea633e6ccf8fd21389b1e0cba8a0d5639e4c924b08666bfa69df3fa5a0e24004d2c5aae5ad5684054ab34c580febd3476281a40d99fcd819a17cd395b4c3e44e0280f70204fb5c85257a47ce0db29eb7c8fa9971eedd57eaec5460a75cb9a95ca731fb1a0c605e715c374db4910eaf0c09b8c5d37da754121ea0eb69abf5e089ed1f7392df699389d6ee54949508c29a6df3140d0b603f1a1d7faf608ff1dbaa6bea8b39e90b979477ac4ed3c5da87266fc088667c8efc354b84e47831d84fed7c01e56bfc217f8253d1f8ce58fd92149b308eec10ca80127f101abac8d80e1fb0e98e14952daa0393a8823e7d95303e8f5ab35dbde1ec6d201bd8ab06205cde4cc14df9447906c8568efe7269363d11fbd31e1706f9bc9184bbc8f5289262ff0e6b86c5015e720ff4032d536d463522fe145e1371780a0100010000000000b67b288b47c65ef8364383102c2d339925f27ed5a9881f7aa40982b6b4d76125c82cedd886cd34f54a3f3e84743d42f8b4a5999a0e1935d77f7a6d2c7449129afece0636929e5704b6bb4c2ab9b303f03d91968df461e5975d7a6adfc71549ed64b363f992e22283c3dd78ce6261161628937774dbed79c42bd2ef2aa5dc7a323a996fd6aeff3a8bca2577e831f1db77e789aa983f0c1de249679b60ac0975bcb954bbede81d851bdd1a0a7830962f5c6e4c5a88102171459862b07f4ca9f91f4ce7cb15b3bc2db2e95dacee55645d289b95c62920f506f65361aae1259dfe6e9108b5a9f72f4cefbf85539fff41ba76090907860c08c71a796d2133339eb0282bd9d09c93870b919c4a5423f6ded7cbfc00000008000000000000000000000000a7b38d021b1ecdf1f9353fe520a4b5b8abf4163bd8e3376317a9295d9753fbfc8967fc7f900ced5913f6695de2db49a7275f85d8dfad726a02c3da4ac744835d3507abb66bb7a23d45a5bbc142bd10e2fdd00db4c7e9fa74ce36e0b20f9c4e87a20c6a589f1c0168c896c0c8aad681c73edfe78bf00f8e8a4c6e70630098c133f0e1f92a0d0c1e4b0bf26c31eb33ebe683f973fc3e0aa18f092845d0aaf70ef7921d13ab2706cabe3d650e080826c0de995d37120f7a969219f2258d54ccda50c870726bf374ab2d66f3ed58d13175b781e6cf0f7a7f33e4db27e463900623cff3e635c3e896bed4419981363d11b8297b6b717a3a6942018ec6704b74bedcfb0e871bdff9eabdec8558bae5034d9993ffefe69ce347f33fdba6a9376f54fea892d8039f0f81ea4df88099f44e62fd4e0f46ee5d69a619f48b40dbaf09c008eb7c1a73e2610d4be9c358afb7f437b5dea548f4bb94f4409dba72bada8e39b6f3075bd7c333348ed555cebf480785d9b7ea71386510de844442cfdf50e7ba88d0c31ac0fe985f408d395b49fa19a8087c41e2539cd642bd1ab0c88a4fa78e04c8594942de59576e781fca62875bc919216e8898d1aefc81a244a597d966706f6e692511a4b45503b3c9bfdcfa12a8c1cc40bbe1de89e688ebb064a55d4f4fe00c8483382ead60cbe853a8eff54eb825ce3b07fa05e51f9ffadab3b4000555a3a4326b459f973fb7340ef66a863708fc7626439271e8ba1c871562c9b2dc1b8ba85287aa8dc7486f306a0d0b31bcf8ab9050e1f5dae9773c06dba27a2b3b2a435267877f628bee19254de71c487ba0fd2a04e76f777e5908a4ec621f634f9964ba6c0e372143659828d3"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0x0, 0x0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) r7 = socket$netlink(0x10, 0x3, 0x4) writev(r7, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r8 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x7, 0x20000) r9 = socket$inet_smc(0x2b, 0x1, 0x0) r10 = accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) r11 = socket$key(0xf, 0x3, 0x2) poll(&(0x7f0000000940)=[{0xffffffffffffffff, 0x100}, {r7, 0x8118}, {r8, 0x8238}, {r2, 0x2018}, {r9, 0x4080}, {0xffffffffffffffff, 0x141e}, {r10, 0x9}, {r11, 0x1024}, {r2, 0x8410}], 0x9, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r6, 0xc4c85513, &(0x7f0000000440)={{0x7, 0x6, 0xfffffff8, 0x401, 'syz1\x00', 0x64}, 0x0, [0x7c, 0xafcb, 0x0, 0x2, 0x8, 0x9, 0x0, 0x5, 0x6, 0x6, 0x116, 0x5, 0xfffffffffffeffff, 0xdc4, 0x5, 0x80000000, 0x675c, 0x1, 0xf9f, 0x9396, 0x3, 0x81, 0x6, 0x7, 0x3, 0x0, 0x6, 0x6, 0x100000000, 0xfffffffffffffff9, 0x80000001, 0x8, 0x10000, 0x1f, 0xc8b, 0x401, 0x1, 0x681, 0x8, 0x8, 0x1, 0x7, 0x4, 0x1, 0x51, 0x40, 0x1, 0x5, 0x9, 0x4, 0x7, 0xffffffff, 0x9, 0x5, 0xa, 0x7, 0x2, 0x7fff, 0x6, 0x56, 0x5, 0x6, 0x0, 0x40, 0x0, 0xc8, 0x8, 0x41da, 0x3, 0x5, 0x0, 0x6, 0x4, 0x1, 0x3, 0x40, 0x30db, 0x5, 0xbd6, 0xfc, 0x5, 0xa4, 0x5, 0x2, 0x3ff, 0xfff, 0x4, 0x100000000, 0x200, 0x1, 0x8, 0x2, 0x5b4a08bb, 0x81, 0xfffffffffffffffe, 0x8001, 0x7f, 0x5, 0x2, 0x0, 0x7, 0xa9e, 0x6, 0x6, 0xfffffffeffffffff, 0x7fff, 0x1, 0x2, 0x6, 0x6, 0x80000000, 0x1, 0x0, 0x9, 0x8, 0x5, 0x8, 0x3, 0xc34, 0x47c4, 0x2, 0x6, 0x1, 0x100000001, 0x3f, 0x74, 0x100000000, 0x1]}) 14:39:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9a00}, 0x0) 14:39:31 executing program 1: syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0xec8b1f4ecb64b4a) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000002c0)={'\x00', {0x2, 0x4e23, @loopback}}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000000, 0x80011, r1, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='io.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000600)=ANY=[@ANYBLOB='7>2)'], 0x4) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0xc00c0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080), 0x5b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_STP_STATE={0x8, 0x5, 0x1}]}}}]}, 0x3c}}, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r7, &(0x7f0000000080), 0x5b) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) 14:39:31 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:31 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x8040ae9f, 0x0) sendto$isdn(0xffffffffffffffff, &(0x7f00000002c0)={0x1, 0x575f, "a038d2f8b72159a12a26ca65ca6cfc2abc526f4eeb881881415a54cd144de1ac0b2435603b8fb76fbfc281ccec73ae9e6a23d8597cbf391b85089de06d859e22691fa08fbe2b642fcdeffba3f0d3df8af934318ed144fbaa15dd6c5aa15d88363a2c34d3"}, 0x6c, 0x4000055, &(0x7f00000001c0)={0x22, 0x81, 0xa0, 0xd4, 0xc}, 0x6) syz_open_dev$ptys(0xc, 0x3, 0x1) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000540)={0xb0, r2, 0x8950ca6c5b448daf, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffff8}, @IPVS_CMD_ATTR_DAEMON={0x8c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_batadv\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffa}]}, 0xb0}, 0x1, 0x0, 0x0, 0x804}, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendto$phonet(r8, &(0x7f0000000340)="1f734b3039adf09a2b0a215b7a0d45e03d8572c5cae294c93c4ce23d1a44592bbe2fb384d39761c1f1589bf27e2933606db9b5bd277e6a323a59f05071882bf101fa46e973df1c2422b70e52dec876c6be4764ca97082cefda11da3c607fe1b3166fc86571a9cdcbc6419971cfeb90dfee6b806f045779a276be8f351e10249ce9297f02b7a72ef27112986a4a2479257eff1bc8ce3eeaca806489e35f2528d0355847bcc89641ea5bf8", 0xaa, 0x40, &(0x7f0000000440)={0x23, 0x81, 0x5, 0x20}, 0x10) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000180)=0x3d, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r10 = socket$netlink(0x10, 0x3, 0x4) writev(r10, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) ioctl$EXT4_IOC_GROUP_ADD(r10, 0x40286608, &(0x7f0000000240)={0x8, 0x1, 0x80, 0x8, 0x7fffffff, 0x3ff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r9, 0x0, 0x0}, 0x10) 14:39:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9b00}, 0x0) 14:39:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9c00}, 0x0) 14:39:31 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 992.793970][T31185] tipc: TX() has been purged, node left! 14:39:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) pipe(0x0) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0xa0000007, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) read(r2, &(0x7f0000000000)=""/55, 0x37) syz_open_dev$sg(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) poll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x6443cb4dc7320343}, {0xffffffffffffffff, 0x4010}], 0x2, 0x3) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f1eaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x8200, 0x2, 0x0, 0x27) 14:39:31 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x8040ae9f, 0x0) sendto$isdn(0xffffffffffffffff, &(0x7f00000002c0)={0x1, 0x575f, "a038d2f8b72159a12a26ca65ca6cfc2abc526f4eeb881881415a54cd144de1ac0b2435603b8fb76fbfc281ccec73ae9e6a23d8597cbf391b85089de06d859e22691fa08fbe2b642fcdeffba3f0d3df8af934318ed144fbaa15dd6c5aa15d88363a2c34d3"}, 0x6c, 0x4000055, &(0x7f00000001c0)={0x22, 0x81, 0xa0, 0xd4, 0xc}, 0x6) syz_open_dev$ptys(0xc, 0x3, 0x1) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 14:39:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9d00}, 0x0) [ 992.963561][T31185] tipc: TX() has been purged, node left! 14:39:31 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9e00}, 0x0) 14:39:32 executing program 1: mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = semget(0x3, 0x3, 0x200) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f00000003c0)=""/4096) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000180)={[0x2000, 0x0, 0x6000, 0x5000], 0x80000000}) rmdir(&(0x7f0000000140)='./file0//ile0\x00') listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/51, 0x33) getpgrp(0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdir(0x0, 0xcfa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) mremap(&(0x7f00001c5000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000b09000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 14:39:32 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x9f00}, 0x0) 14:39:32 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x9) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="f5652ccabc65e8e3ff5fb3fadc1eb4353f8cbecca60c15f27bd5b5377aff9f451f0063ead3869b88a8e816baab0a5eaad5de0c27f4252b0a07f9d2549a02cd85f104472f5f63afe7a02b60150c04", @ANYRES32=0x0, @ANYRESHEX], 0x3, 0x0) r1 = socket$inet(0x2, 0x8, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r2 = gettid() waitid(0x0, r2, 0x0, 0x0, &(0x7f0000000480)) sendmsg$key(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESDEC=r2]], 0x8}}, 0x20004850) r3 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x40) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, r3) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x50, &(0x7f00000001c0)=""/95) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x66, &(0x7f0000000240)={0x0, 0xfffffffe}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000340)={r10, 0x8e79}, 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bic\x00', 0x4) sendto$inet(r1, &(0x7f0000000080)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfffffe37, 0x200403f8, 0x0, 0x0) 14:39:32 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa000}, 0x0) 14:39:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x17, "3aa879e99ee76c70eb6879bd93c500a2b1e2b97a73cfd1"}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r3, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r4, 0x6, 0x18}, 0xc) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x1e94, 0x9, 0x5, 0x8}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4, 0xffffffff, 0x18}, 0xc) r6 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r6, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000100), 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='htcp\x00', 0x5) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x620, 0x0, 0x0, 0x7, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) mmap$snddsp_control(&(0x7f0000ffd000/0x2000)=nil, 0x1000, 0x2000004, 0x8010, 0xffffffffffffffff, 0x83000000) connect$rxrpc(r4, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6e217b91c3b0d873722b41afb8ed58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1bae2728316e63e58afdf284732bd1e1970881ddd3c9f310f827c195f3c5d57c67a08466517ba1300000000858003ffffffffffffffff3e26b5ca26bb434dbd0e4885c214e577bb081876e63e7c2834573925db8b54b33da7b9c7aefca1f9c49c6400000008000000000000000061e2448f23a7e49736a335440c5b7681c58dc647494f0dbc811becd7c487d283b2d0574510103af981adebcd7535c0b3a3df610d9975d1d957c3b410c2ab65977da598ffa069c01b3d386c15d34a5918d6909192ec97032c320044fa934bf944d6d5ce621d91c17f1c4377a54c7febb46f83a7842816023b60417388196a22091c9f82e8e0291f4082d92d0ae76b94a18647bb44cbe9366a08fb3f0000644307c51085f7215fd44635e5967f21e8f59bd021f309d910cb5d37cb16450244ef261a37255a06c97f19fa0e68836543174745684037cc7bba99aa1cbefcdd62f799a5fb35abc5af3ab43a5fc40eb352e6ff078fad68182845f1f6b7ff6c200c103b64608404b41fce73186e55193d3d96faab588048349b35e431914bfde3c07f1419dac11995aded30b44ead7142a7b397a913f6bac2eac41c32d10863c3e6dd9e88d44842951e15d6d631995f07143416b73746d0833ff3a766a4b094bc6d5c69bd6b19e0043ba97cab8506b298a96b4707000000b77270f84d17c3d89c98aec479773696f16e5b9cd5be452742ba37ca722200d5256a04cd2ff6008bd26f1fe85d60ce476bffc936ca19e9d003"], 0x18}}], 0x1, 0x4048000) dup3(r3, r4, 0x0) getsockopt$netlink(r3, 0x10e, 0x7, &(0x7f0000000140)=""/118, &(0x7f0000000240)=0x76) dup3(r1, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={r5}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r5, 0x8000}, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65880068481641ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e75", 0x37, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) 14:39:32 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa100}, 0x0) 14:39:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x7fc, @loopback, 0x5}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x0) 14:39:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa200}, 0x0) 14:39:33 executing program 1: mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = semget(0x3, 0x3, 0x200) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f00000003c0)=""/4096) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000180)={[0x2000, 0x0, 0x6000, 0x5000], 0x80000000}) rmdir(&(0x7f0000000140)='./file0//ile0\x00') listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/51, 0x33) getpgrp(0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdir(0x0, 0xcfa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) mremap(&(0x7f00001c5000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000b09000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 14:39:33 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000100), 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='htcp\x00', 0x5) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x620, 0x0, 0x0, 0x7, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) mmap$snddsp_control(&(0x7f0000ffd000/0x2000)=nil, 0x1000, 0x2000004, 0x8010, 0xffffffffffffffff, 0x83000000) connect$rxrpc(r4, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) dup3(r3, r4, 0x0) getsockopt$netlink(r3, 0x10e, 0x7, &(0x7f0000000140)=""/118, &(0x7f0000000240)=0x76) dup3(r1, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={r5}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r5, 0x8000}, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f65880068481641ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e75", 0x37, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) 14:39:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa300}, 0x0) 14:39:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) getsockopt$bt_hci(r3, 0x0, 0x1, &(0x7f0000000180)=""/83, &(0x7f0000000080)=0x53) r4 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r4, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:33 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000002c0), 0x12) r2 = socket$inet(0x2, 0x3, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x202a00, 0x0) r3 = getpgid(0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0xaca00) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000002c0)='3', 0x1}], 0x1) ppoll(&(0x7f0000000200)=[{}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="020000000100eb0000000000020001", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="29e8ff", @ANYBLOB='\b\x00\x00', @ANYRES32, @ANYBLOB="080005115951c076757a2164ca8343141a6943598cb38a77d4b5fdcc7247b9c301bf24d95441febf5a16ae429194cf41f9772a21df3fbefdfd920f68e5e58ca390181d9c686c6f0806637ac4b7731b7f6de976e4e0d345ac1f83f37848b5d5b56a01e79ab40bbb305f671cd284a96fcde9d239a3903b62be11d8bdeb221b78f50d36fa1ee0eab6a18bc728402f38703bbfdbb1a965e7870ddb8363b8122f7fef2e63bc428e5d73fd6821dc55ecdc17035dcf0b57a4d4bdd8b3013c3b58dc0e72365cd36a0aaa1f583bd2e6bda71a8a4ad3efb0a7f176", @ANYBLOB="74b24e1f0ef01479f571f55b37d7089c077e74b1bd50a45834473f982e6fd1fd97f815af9ca38040c073a4e24e033248357bfb5ab67092f29f0b1a66e443cc9e9ef2a93a80607607e3231fc4077092a7af7f95cd0ac29c703cc271896016d7b31ca22f3b0b56e5fec2690ec778d14906d776e06d1e11235fee66cd66"], 0x8, 0x1) r5 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r5, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESDEC]], 0x8}}, 0x20004850) r6 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r6) r7 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r7, 0x227d, &(0x7f0000000780)) kcmp(r3, 0x0, 0x1, 0xffffffffffffffff, r7) ptrace$setopts(0x4206, r6, 0x0, 0x0) r8 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r6, r8, 0x0, 0xffffffffffffff4b, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) recvmsg(r2, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000002540)=[{0x0}, {0x0}, {&(0x7f0000003800)=""/4100, 0xffffff5f}], 0x3, 0x0, 0x17b, 0x3e8}, 0x180) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:39:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa400}, 0x0) 14:39:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000080)) r6 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r6, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)="9cab198dde15bf04652fc515a961bd7c637677c00406", 0x16}], 0x1}, 0x0) 14:39:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa500}, 0x0) 14:39:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, &(0x7f0000000340)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000440)={{0xa, 0x4e22, 0x6, @remote, 0x1}, {0xa, 0x4e20, 0x7, @mcast1}, 0x7, [0x0, 0x1, 0x7ff, 0x0, 0x200, 0xfffffffe, 0x8001, 0xfffffffe]}, 0x5c) syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x80000001, 0x4000) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000c00)=ANY=[], 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, 0x0, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffff}) ioctl$DRM_IOCTL_AGP_UNBIND(r5, 0x40106437, &(0x7f0000000140)={r6}) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r7, 0x0, 0x10000000000443) r8 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r8, 0x0, 0x0, 0x0) getsockopt$packet_int(r8, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000540)={{0x0, 0x3, 0xffff, 0x0, 0x9}, 0xffffffff, 0x8000, 0x5}) 14:39:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgrcv(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 14:39:34 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa600}, 0x0) 14:39:34 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa700}, 0x0) 14:39:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x4000000080002, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, 0x0) setuid(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000140)={0x7, 'ip_vti0\x00'}) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r1) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000940)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000604000000000000000000000a0100000000000000010000040000000200000000020000000b000000003000e2612e0032870b80ebcc6536a877536e1c01c6ee9661bad8b4f64538032bc6949cb297b80a25a129d7ee5b12e7b1177584b27c6ab8f24b74cd924019aca3b80333abb3b9c4cb95cfcf4f1c3425a1a97b82c1f7dde00046256e1b0a321f679d2a0bbb13ccef4a5b48b655461e366d640f91d2337ad24eeb64fcc00ee9fa18b0471ac00591ff00349fbf34b14ea130b87fac9129301f42c305ab5e08268720e90a3be372166613945bb6638540ecf4307c1a735c9fa9c5ed886b396c0071a4c9b3dc78e6a0d71f9cbce8a20d69be392a56e3d13509b18820f8a5b3eec7847fffdc5df0158055fdb55af7abedc96b5985d23c97ec778cf0eeed14e3d03cbaa246bc2b85500128ea48ecbfb47c10c08a54105e02e12cda1bb63bb07f3cb1fbc65c2aab3b5cc0fc82e48a54df308de4ad4e0f8e337f229b2b90da2e4e56a31ef2e648d4242931e73c7fd3c608d68b19275cad0f88261089f7cf70a3f95dbda8398d41dd70736cf0bb1159209372d8546f70ac228d072d601e45c91bc81d517208da20a63a02446c3cfb1977dc2af9c34256f18fe2631705f094872b0a2d24740e647bc0404503713f8a0058efef0800a87206da40d3f0055c5d8735044aefedbb582254dfcf69c1e5e3f261b4f4d3dfd70090e63ffc5940e4d5789d5f49d846eaee0d65f0214f41261dc852acc30bdb8f2e2856f0846eaf5e39b73b656ca4a384cd5b6c03ced10da3c7609c3a27c26e47b12bc74e19d6f24cbbb3c930b458b0dad7c83b2100d81a5ec8d1e998a853b5d23f06a30effc4fe1244beace702434656debfdc872f2db03b206ca83c8b41937207b14e138a1d23258fec572c8743bccea87807483dc54c7473d00d2ee785d04fd63b738eab4b75b93e45abcfb9b2cc091b53de"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x8}, 0x20) preadv(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x400000040000) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0xa, &(0x7f00000004c0)=0x0) io_submit(r4, 0x0, &(0x7f0000000540)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000040)=0x1, 0x4) r5 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r6, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="b00000", @ANYRES16=r7, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4000801}, 0x0) read(r5, &(0x7f0000000200)=""/22, 0x16) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(r8, 0x1) read(r2, 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x7, {0x8}}, 0x18) 14:39:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000002840)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @rand_addr=0x401}, 0x1, 0x0, 0x2, 0x3}}, 0x80, &(0x7f0000002480)=[{&(0x7f0000000200)="c6dcebe68c925c3ca2c62d0e7a6436b3e03351a89cae5835453cd3f34e9e2cacb13552583dbf32b4d20aefbb465e424d448dd4fb73d422a2b5c7364c640154e89255c5c8cb5ac71a509936aaef5bb05b74a0660cb7dc2594119f5d07", 0x5c}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="f83b1c771e223c6ae0ad9ccf589b82227194f436791105317f29f36d4eec725b91979b3dbd3f9c2cc27117e360a4c9707ac8832c2527098f9cecc6eb6e0c43cc9f299d1e1d6533558b200570154c4abe9720c1e63dcc2c25250422c0ada767c33c2ef01eef4cfbd2e16864a66834e1afde3833f5c5dfcae98e868be1d05ecc0981f6b7f3ad628aba7cc7f567ac4b647dc6ec6ac8b2d318d2b83699d6cc22ba88f8b17749aa3e6dd0", 0xa8}, {&(0x7f0000001380)="ace01130cdd4c9b81d9bf52487f31414e038a3fadf8fdae21343bf952006b27d151ff50d13c24f3563e2769ad828364fa2e00ef1bfb659d4e70aa92925622c6903d219ecf0ad9f6040f54cc89c2c34c49be232eb8599c68bab155e8fe3ea4fc8463048774446041bebf2708c211f9137f5e17094f6e2e072d7bd9bc5897b6bf05120d3bed5e69921a1c15959ea25d21fd8a52d7b2a9e5cc5d8a941a85897e4eac1e674496416b4ddd8966b1f0cdc9c916eadc543710f6c2eb132317f13f96f38e988d159e8675b9e0e", 0xc9}, {&(0x7f0000000100)="979e48420db49f52b276a5c6579de9f4dab9bd24a926f7f1", 0x18}, {&(0x7f0000001480)="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", 0x1000}], 0x6, &(0x7f0000002900)=ANY=[@ANYBLOB="600000000000000004010000ff7f000040f04652123e79aca703f96fafdeebef83c3ba273ca777054e95415efe9a7dc985781cd4464540dd4ce88f2cef3becb8eda2a59189e8bbaafb2055581c3ba70d5f59875bab9148d989c2f8cc000000009800000000000000140100000500000043ecb868e2aeaa5e411a24c5ceb0f699456c842d48cfc178dd4532bb79960f53051652aad483f3958163f450e18bde5b9c759234134b000327eada8e13fa9a1c57cfafb2de431f83b72f126aed608170dfabdbdab1daebb0a07b7c28d50e8e254c678e30df1502aa0a90411eba08c4fc98a88ed4fcc85404dcb11e9a9e66b481c2016bb53b1e6f87824d559b5d91770c5269d4f6bd00c8000000000000001100000000040000528d1727f7b05ada089770c981cc978ba3997a316bca0eb2697af5c5c3119e38c0f4a1337f874d121321426afabb5116799c21f3a8a5420f3c8fe16a5d906a09a0036060729de764d966434ad4b7f8e09e71864b4f2c278a5febf990bb558cdb212efee9ad75202563fda205c271039d90e6a8cb2bc22b15e92f7379859b44f5f2222ca6c3d2e597a0cbbae546d4c4781d3c7bf802b976acc9642aa0bf766dc1d99a5b6fa7cf6cc1681927e5b5c09b88ca2da7c75268c27120000000000000001901000001000080c256360b10d18fa09734544d0000000078000000000000000f01000005000000473246ab351b244a7bd5c5115d62b8f08f2f860b679bdba1ad6a665c13d3ef83628c9a692b147bab30d34c6d304f247f4fdf52709e646e4707cd89839798ad758188403f0af77abb8187b5cca6e179d618bf2e1cd0057a919095b0a9c5ad802cb17c000000b0000000000000000f0100ffff0000002ed93a0758ea3069845ce26b5ec3c7f141a305cb73581b5654511a466654ef67fb0677c4aba338ec11c1e647fab6c8295c6d52e3ae6087604a0de473a2c779aa2a8d71140265c96d0ff672eb03b0317f2ff8a921338db15a4faf5a9aa84b0094850e26c015ce8ad4b5989617b42fc649c4c5b82e8f495e8096cb59e5f07a97b11e799bc03a91769abaf7e74ddd7bfcdac0c729e603b981951f1ee88f00000000034a8a140fc383f55e9226befadc10b91f550c39d36744482d58dac199d20c23ea1912e30644233ef73903e59bdb190d90ccaf1d809714450d22103dbd80ab5492c539cc5e620a25d163fffbb4d186bde5695dc0ca8863e4642d8e44406e940dc9e96bc6680d35c4d923813eb58ab6b203098c94eb017e0c05cdcd706810d3688998c37acc6119142c23e19afe86c233aaeb8e16ca7b4df1efb8d29e460c37da93c3ecc9882a312cda442962f71c100663c62598fe37042f8498c761bbba32741cc794a50efdaa7bd7bd101720a2056d5f1f8e6f3411a61ed77900000000"], 0x308}, 0x40) r3 = socket$kcm(0x11, 0x3, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000080)) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:34 executing program 5: r0 = socket$inet(0x2, 0x3, 0xe3) getsockopt(r0, 0x0, 0xd1, 0x0, 0x0) 14:39:34 executing program 4: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000800000e, 0x0) open(0x0, 0x0, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0207000002000000000000000000ffe5"], 0x10}}, 0x0) 14:39:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x200, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpeername(r0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, 0x0) setuid(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000140)={0x7, 'ip_vti0\x00'}) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r1) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x8}, 0x20) preadv(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x400000040000) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0xa, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000040)=0x1, 0x4) r5 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r7, 0x0, 0x0) r8 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r8) tkill(r8, 0x38) sendmsg$TIPC_NL_NODE_GET(r6, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=r6, @ANYRESOCT=r8, @ANYRESHEX, @ANYRES64], 0x5}, 0x1, 0x0, 0x0, 0x4000801}, 0x0) sendmsg$TIPC_NL_LINK_GET(r5, 0x0, 0x4008048) read(r5, &(0x7f0000000200)=""/22, 0x16) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(r9, 0x1) read(r2, 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x7, {0x8}}, 0x18) 14:39:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000180)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = gettid() ptrace$getregs(0xc, r4, 0x0, &(0x7f00000001c0)=""/30) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000280)='R\trust\xe3cusgrVex:De', 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f00000000c0)=""/92) 14:39:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa800}, 0x0) 14:39:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) r7 = socket$netlink(0x10, 0x3, 0x4) writev(r7, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) fcntl$dupfd(r4, 0x0, r7) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x200, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpeername(r0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, 0x0) setuid(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000140)={0x7, 'ip_vti0\x00'}) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r1) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x8}, 0x20) preadv(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x400000040000) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0xa, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000040)=0x1, 0x4) r5 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r6, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r7, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4000801}, 0x0) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="08002cbd7000fddbdf25080000001000040073797a30000000002c000900080002000900000008000100000000000800010001010000080001000800ee9c08000100faffffff00000000"], 0x50}, 0x1, 0x0, 0x0, 0x8054}, 0x4008048) read(r5, &(0x7f0000000200)=""/22, 0x16) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(r8, 0x1) read(r2, 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x7, {0x8}}, 0x18) 14:39:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xa900}, 0x0) 14:39:35 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 14:39:35 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDDISABIO(r2, 0x4b37) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14, 0x0, 0x4}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x0) 14:39:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xaa00}, 0x0) 14:39:35 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0) 14:39:35 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/wireless\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) sendfile(r2, r0, 0x0, 0x6f0a77bd) 14:39:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xab00}, 0x0) 14:39:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 14:39:35 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000080)) r5 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r5, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:36 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x0) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xac00}, 0x0) 14:39:36 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:36 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x54, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}}, 0x4000810) 14:39:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x20082, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r6, 0x6}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$EBT_SO_GET_ENTRIES(r9, 0x0, 0x81, &(0x7f0000000440)={'broute\x00', 0x0, 0x3, 0x35, [], 0x9, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/53}, &(0x7f0000000240)=0x78) r10 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vsock\x00', 0x202800, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r10, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB="98000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fbdbdf25030000005c00010008000b0073697000080005000000000008000b0073697000060004004e240002080008000400000014000300ac1e010100000000000000000000000006000100020000000c00070010000000180000000600020033000000180001000a0006006c626c6372000000060001000a00000008000500030000000800060001000000"], 0x98}, 0x1, 0x0, 0x0, 0xec1f69865da7bb2e}, 0x80) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x7, "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", 0x53, 0x8, 0x5, 0x9, 0x3, 0x1f, 0x4c}, r6}}, 0x120) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r11 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r11, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:36 executing program 1: set_mempolicy(0x3, &(0x7f0000000140)=0x1ff, 0x8) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000080)={0x0, 0xb80}) 14:39:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, 0x0, 0x0) splice(r2, 0x0, r0, 0x0, 0x1004, 0xe) 14:39:36 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:36 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) splice(r2, 0x0, r0, 0x0, 0x1004, 0x0) 14:39:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xad00}, 0x0) 14:39:36 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000080)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:37 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x0) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:37 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xae00}, 0x0) 14:39:37 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0xc0046d00, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 14:39:37 executing program 5: set_mempolicy(0x0, &(0x7f0000000000)=0x5, 0x2) 14:39:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x200181, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) fcntl$setlease(r4, 0x400, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r5, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) socket$tipc(0x1e, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup2(r12, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SOUND_MIXER_READ_STEREODEVS(r13, 0x80044dfb, &(0x7f0000000440)) write$FUSE_CREATE_OPEN(r8, &(0x7f0000000380)={0xa0, 0x0, 0x4, {{0x2, 0x0, 0xd7, 0x8eb, 0x9, 0x8, {0x0, 0x13e02a2f, 0x400, 0x9, 0x7c, 0x6, 0x200, 0x8, 0x25d2, 0x5, 0xfffffffe, r9, r10, 0x7}}, {0x0, 0xe}}}, 0xa0) 14:39:37 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000100)={0x0, 0x0, [], {0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x7}}}}) writev(r0, &(0x7f0000000140), 0x32e) 14:39:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xaf00}, 0x0) 14:39:37 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000016"], 0x1}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) [ 998.887864][ T8274] input: syz1 as /devices/virtual/input/input26 14:39:37 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb000}, 0x0) 14:39:38 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x0) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:38 executing program 5: syz_open_dev$media(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socket$inet(0xa, 0x0, 0x0) 14:39:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000100)={0x0, 0x0, [], {0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}) writev(r0, &(0x7f0000000140), 0x32e) 14:39:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb100}, 0x0) 14:39:38 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r5 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r5, 0x0, 0x0, 0x0) getpeername$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r10, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r14, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r14, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r14, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @local}, &(0x7f0000000340)=0xc) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000440)=0x0, &(0x7f0000000480)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f00000005c0)=0xe8) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r21, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r21, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r21, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004ec0)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6}}, &(0x7f0000004fc0)=0xe8) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r26, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r23, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r26, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r26, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r27 = socket$nl_route(0x10, 0x3, 0x0) r28 = socket$netlink(0x10, 0x3, 0x0) r29 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r29, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r29, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r28, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r30, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r27, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r30, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r30, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r31 = socket$nl_route(0x10, 0x3, 0x0) r32 = socket$netlink(0x10, 0x3, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r33, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r32, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r34, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r31, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r34, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r34, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000005100)=0xa0) getsockname$packet(r2, &(0x7f0000005180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000051c0)=0x14) r37 = socket$nl_route(0x10, 0x3, 0x0) r38 = socket$netlink(0x10, 0x3, 0x0) r39 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r39, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r39, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r38, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r40, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r37, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r40, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r40, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r41 = socket$nl_route(0x10, 0x3, 0x0) r42 = socket$netlink(0x10, 0x3, 0x0) r43 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r43, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r43, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r44, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r41, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r44, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r44, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r45 = socket$netlink(0x10, 0x3, 0x4) writev(r45, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r46 = socket$nl_route(0x10, 0x3, 0x0) r47 = socket$netlink(0x10, 0x3, 0x0) r48 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r48, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r48, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r47, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r49, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r46, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r49, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r49, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r45, 0x8933, &(0x7f0000005200)={'vxcan0\x00', r49}) getsockname$packet(r2, &(0x7f0000005240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005280)=0x14) r52 = socket$nl_route(0x10, 0x3, 0x0) r53 = socket$netlink(0x10, 0x3, 0x0) r54 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r54, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r54, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r53, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r55, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r52, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r55, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r55, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r56 = socket$nl_route(0x10, 0x3, 0x0) r57 = socket$netlink(0x10, 0x3, 0x0) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r57, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r59, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r56, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r59, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r59, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r60 = socket$nl_route(0x10, 0x3, 0x0) r61 = socket$netlink(0x10, 0x3, 0x0) r62 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r62, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r62, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r61, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r63, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r60, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r63, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r63, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000a000)={'sit0\x00', r63}) r65 = socket$netlink(0x10, 0x3, 0x4) writev(r65, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r66 = socket$nl_route(0x10, 0x3, 0x0) r67 = socket$netlink(0x10, 0x3, 0x0) r68 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r68, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r68, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r67, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r69, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r66, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r69, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r69, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r65, 0x8933, &(0x7f000000a040)={'vxcan0\x00', r69}) r71 = socket$nl_route(0x10, 0x3, 0x0) r72 = socket$netlink(0x10, 0x3, 0x0) r73 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r73, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r73, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r72, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r74, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r71, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r74, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r74, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r75 = socket$nl_route(0x10, 0x3, 0x0) r76 = socket$netlink(0x10, 0x3, 0x0) r77 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r77, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r77, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r76, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r78, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000800000000724278714f5cf95173b4bf421f0326f4d9b3e1213809d0c07005099ff00000000000000000b73891b94fb6bfe5da12970a47b3c12bafcdb593b30"], 0x48}}, 0x0) sendmsg$nl_route_sched(r75, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r78, @ANYBLOB="00000000ffffffff0000000008000100736671004800000000000000000000000000000000a90000000000000000000000000000000000007700000000000000ecff007af0c051c9edfca708d26b327efd9575ebda000000"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r78, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400001003c0001000000ff03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f000000a940)={&(0x7f0000000080), 0xc, &(0x7f000000a900)={&(0x7f000000a080)={0x86c, r4, 0xa1a, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r6}, {0xc8, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x1f0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r17}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r21}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x18e6d9af}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000000}}}]}}, {{0x8, 0x1, r22}, {0x220, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x63eb}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r30}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r34}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r35}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r36}}}]}}, {{0x8, 0x1, r40}, {0x1f0, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r44}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r50}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r51}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r55}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r59}}}]}}, {{0x8, 0x1, r64}, {0x168, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r70}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r74}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xbe71}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r78}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20000001}, 0x30004888) r79 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r79, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb200}, 0x0) [ 999.752360][ T8300] input: syz1 as /devices/virtual/input/input28 14:39:38 executing program 4: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:38 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x54, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}}, 0x4000810) pipe(0x0) 14:39:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000080)={0x3}) 14:39:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb300}, 0x0) 14:39:38 executing program 4: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:39 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0xffffffffffffffff, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:39 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x54, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}}, 0x4000810) 14:39:39 executing program 1: 14:39:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb400}, 0x0) 14:39:39 executing program 4: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb500}, 0x0) 14:39:40 executing program 1: 14:39:40 executing program 5: 14:39:40 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:40 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0xffffffffffffffff, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:40 executing program 1: 14:39:40 executing program 5: 14:39:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb600}, 0x0) 14:39:40 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000005f80)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005d00)=[{{&(0x7f0000000180)=@nl=@proc, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000100)=""/41, 0x29}, {&(0x7f0000000200)=""/82, 0x52}], 0x3}, 0x1}, {{&(0x7f0000000300)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000380)=""/155, 0x9b}, {&(0x7f0000000440)=""/253, 0xfd}, {&(0x7f0000000540)=""/48, 0x30}], 0x3, &(0x7f00000005c0)=""/252, 0xfc}, 0x7}, {{&(0x7f00000006c0)=@tipc=@name, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)=""/32, 0x20}, {&(0x7f0000000780)=""/214, 0xd6}, {&(0x7f0000000880)=""/100, 0x64}], 0x3, &(0x7f0000000940)=""/251, 0xfb}, 0x330b}, {{&(0x7f0000000a40)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000003b00)=[{&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/10, 0xa}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x4, &(0x7f0000003b40)=""/4096, 0x1000}, 0x254a}, {{&(0x7f0000004b40)=@xdp, 0x80, &(0x7f0000004c80)=[{&(0x7f0000004bc0)=""/31, 0x1f}, {&(0x7f0000004c00)=""/100, 0x64}], 0x2, &(0x7f0000004cc0)=""/153, 0x99}, 0x10000}, {{&(0x7f0000004d80)=@nfc_llcp, 0x80, &(0x7f0000004ec0)=[{&(0x7f0000004e00)=""/6, 0x6}, {&(0x7f0000004e40)}, {&(0x7f0000004e80)=""/45, 0x2d}], 0x3, &(0x7f0000004f00)=""/254, 0xfe}, 0x7f}, {{&(0x7f0000005000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000005140)=[{&(0x7f0000005080)=""/155, 0x9b}], 0x1, &(0x7f0000005180)=""/123, 0x7b}, 0x800}, {{&(0x7f0000005200)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000005580)=[{&(0x7f0000005280)=""/208, 0xd0}, {&(0x7f0000005380)=""/156, 0x9c}, {&(0x7f0000005440)=""/134, 0x86}, {&(0x7f0000005500)=""/66, 0x42}], 0x4, &(0x7f00000055c0)=""/62, 0x3e}, 0xc9fb}, {{&(0x7f0000005600)=@in6, 0x80, &(0x7f0000005980), 0x0, &(0x7f0000005a00)=""/197, 0xc5}, 0x2}, {{&(0x7f0000005b00)=@hci, 0x80, &(0x7f0000005cc0)=[{&(0x7f0000005b80)=""/136, 0x88}, {&(0x7f0000005c40)=""/57, 0x39}, {&(0x7f0000005c80)=""/28, 0x1c}], 0x3}, 0x8}], 0xa, 0x40000063, &(0x7f0000005fc0)={r4, r5+10000000}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$netlink(0x10, 0x3, 0x4) writev(r8, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r8, 0x400c6615, &(0x7f0000004e40)) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)={0xa4, r9, 0x23f, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x88, 0x14, 'broadcast-link\x00'}}}, 0xa4}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000060c0)={&(0x7f0000006000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000006080)={&(0x7f0000006040)={0x34, r9, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x15, 0x9, @udp='udp:syz2\x00'}}}, ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20044800}, 0x1) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x4000000) 14:39:40 executing program 1: 14:39:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000780)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x268, 0x0, 0x268, 0x268, 0x268, 0x460, 0x460, 0x460, 0x460, 0x460, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x220, 0x268, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'veth1_virt_wifi\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x9}}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x1f8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) syz_emit_ethernet(0x4e, &(0x7f0000001d40)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x18, 0x6, 0x0, @rand_addr="fe800000000000004ce33c06799c8423", @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@eol, @fastopen={0x22, 0x2}]}}}}}}}}, 0x0) 14:39:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb700}, 0x0) 14:39:40 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r6, 0xc0385720, &(0x7f0000000700)) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') getpeername$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1f8, r7, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_FLAGS={0xc, 0x11, [@NL80211_STA_FLAG_AUTHORIZED={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}]}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xc7, 0xbe, "d95bd627ceb23bc20a34bbed3dee07d3619eb4288ff473f6fae0b0a01973197d7c6370e7a7c2c2a28f1f6ab26aabb33eb40c05eda0875b3d93000d530e9d1e096d07b18cf723d2a731ecbaccf0659a4c7918e0a63c3f9e80d895a168d8d3c1a8158d760f511ea1262a888ac91173a69d70990856079f5d19457581b011e5a6ede505ae5049b1c58386180f79cc77fe2b1ec51f841009805ee1db7e1b0c0429898d0ba136a24a2cd4ad87cdff48310acf29cf7bf02cc5f5c2167eeca8859817f5817015"}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x3b3}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x1}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r8}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xf6, 0xbe, "7135ea82e5f5aa3705a1cf704f13a06352e711f96c1f66ad2020db52d443f54eee269c4deb1ded758536c7d03e4ce1d0904693c84b0c442cd7a7ae64dbde956851fc5ead25afdc17b8e7ea906aa93851fa781155162cd4ebc167923475233ff4525058f35264b42f6a80014ba384edf16f6ebe432d5a8e111c117c635fbc75c146f5331e4ee7e593dc1741604379034d13d067eba151ee5dd9b074bd63175641b23f42963a2eecae482b70fc35484f264ee39256cc5b45291f26288cde36bf0fcbc800a2ac9f707d62605c28e1222e4e32ef293ce089b390fa86a5ec51d8e56bb8e01cc1d70838f96e35504c8ed5d38432be"}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x81}, 0x24000811) r9 = accept4(r3, 0x0, &(0x7f0000000100), 0x800) setsockopt$bt_BT_POWER(r9, 0x112, 0x9, &(0x7f0000000180)=0x20, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r11, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$EVIOCGBITSND(r12, 0x80404532, &(0x7f0000000600)=""/246) r13 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r13, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) [ 1002.247965][ T8385] xt_CT: No such helper "snmp_trap" 14:39:41 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0xffffffffffffffff, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb800}, 0x0) 14:39:41 executing program 4: socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000780)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x268, 0x0, 0x268, 0x268, 0x268, 0x460, 0x460, 0x460, 0x460, 0x460, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x220, 0x268, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'veth1_virt_wifi\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x9}}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x1f8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) syz_emit_ethernet(0x4e, &(0x7f0000001d40)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x18, 0x6, 0x0, @rand_addr="fe800000000000004ce33c06799c8423", @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@eol, @fastopen={0x22, 0x2}]}}}}}}}}, 0x0) 14:39:41 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0x0) 14:39:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000180)=@nfc={0x103, 0x14}, 0xa1, &(0x7f0000000100)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}, {&(0x7f0000000080)}], 0x1}, 0x0) 14:39:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, 0x0) setuid(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000140)={0x7, 'ip_vti0\x00'}) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=ANY=[], 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x8}, 0x20) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="b0000000", @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x34000859}, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/22, 0x16) socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(0xffffffffffffffff, 0x1) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x7, {0x8}}, 0x18) 14:39:41 executing program 4: socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xb900}, 0x0) [ 1002.702419][ T8410] xt_CT: No such helper "snmp_trap" 14:39:41 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x18) sendto$inet6(r1, &(0x7f0000000100)="cfafe990db3d3009d124297b1ac617fe8623f1863d9a0585380ea0a19f7f9f652df286d072feaf8203859ca2f6c27b4d07833294aa57f215064ffe87843c60bd41c4a7e0fb6c0133dc7c465208d59778b2212c3fc7ecb0dad5e3d0542256cdff71e68889b2c834fa5748024b6e0c92ca98d0f65351fff8c4a5000000000000", 0xb559, 0xe00, 0x0, 0xfffffffffffffdd5) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x14984a, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) recvfrom$inet(r0, &(0x7f00000002c0)=""/102385, 0xffffffffffffffc1, 0x0, 0x0, 0xfffffffffffffe56) 14:39:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14, 0x0, 0x4}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x80) 14:39:41 executing program 4: socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:42 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xba00}, 0x0) 14:39:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'veth1_to_hsr\x00', 0x0}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3, 0xa00) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x1000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) fcntl$getownex(r3, 0x10, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000003c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, r4, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x37}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x60000001) sendmsg$NLBL_UNLABEL_C_ACCEPT(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, r4, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @multicast2}}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:sulogin_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr="1fa7cbe94cdb745cd9718dad18a38eba"}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004021) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c000000100011042300"/20, @ANYRES32=r1, @ANYBLOB="00000000000000001c001a8018000a8014000700ff010000000000000000000000000001"], 0x3c}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r6) r7 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r7, &(0x7f0000000000), 0x40000000000024a, 0x0) 14:39:42 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000140)={0x0, 0xde01, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, r6, 0xd0f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local, 0x7b37}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xcc, r6, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x5, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2d}}}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x75}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7541}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000880}, 0x20000801) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r9, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 14:39:42 executing program 1: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000001840)=[{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000002000)="9d41", 0x2}], 0x1}], 0x1, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0x0) 14:39:42 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r2) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r3) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000540)='-securitboxnet1\x00)G-l\xafrI\xa1#\x8d\x02RJ\xf9\xa6\xbe`~aI\xc9\xdd\x7f\xa4\xd3W\x93\'\xd2\xdb\xec\xa8:\x90I\xe72\xfa\xf4\\\xa0\xd8\xac\x167*!`\xd9gw\xd0\xed\x03\x8d~K\xd6L\x98\x01r\v\xe5\x99,,\xe6\xd9\x1f9\x8b\x98\xf0K\xffW\xa2\xfd\x1d\"\xf7\xa39S\x8fu\xcc\xceV\x8d\vd\xe7\xf3\x0f\v\xec/\x02\x8c\xb0i\xc63&\x98\xe0\xb4\xb6,W\x1e\xbe\xe5t\xeb\xb4}f', r4) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = msgget(0x1, 0x0) msgsnd(r5, &(0x7f00000007c0)={0x1, "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"}, 0x1008, 0x800) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x25}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r6 = dup(r0) r7 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f00000000c0)={'team_slave_0\x00', &(0x7f0000000000)=@ethtool_stats={0x49}}) sendto$inet6(r6, 0x0, 0x0, 0x20008000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'team_slave_0\x00', &(0x7f0000000000)=@ethtool_stats={0x49}}) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000200)=""/78) r8 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x5, &(0x7f00000000c0)) ftruncate(r8, 0x2007fff) sendfile(r6, r8, 0x0, 0x87ff7) 14:39:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xbb00}, 0x0) 14:39:42 executing program 5: r0 = socket(0x0, 0x80002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newsa={0xf0, 0x1a, 0x0, 0x0, 0x0, {{@in6=@rand_addr="7487f654b36e414647e04d6a85aceeb0", @in6=@rand_addr="e3daef21b274a924bab3619673863f5d"}, {@in, 0x0, 0x6c}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0x0) [ 1003.384309][ T8451] tipc: Enabling of bearer rejected, failed to enable media 14:39:42 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) [ 1003.478980][ T8460] tipc: Enabling of bearer rejected, failed to enable media 14:39:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lchown(0x0, 0x0, 0x0) rt_sigpending(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r1 = socket(0x10, 0x80002, 0x0) sendfile(r1, r0, 0x0, 0xf0d) 14:39:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) open_by_handle_at(r1, &(0x7f0000000180)={0xf8, 0x7, "2b4d3b944e903cad020ae6b32c7b0dbdec8655648fdce56e7dd2af98bbae92cfe51106e403f09593d3eee2cc8ad9c00383ecf4ec3acd41ce562ba0705e3c303c292a6acba8e41aa5dd698259e45f8ce934e5a110f62a9e80983a7025da7f12759acc1771c7e3733a026c114a001dc3a9e0dc00562df42aa74c3eb65bdb5dc132016e0faa34f78dcd1de250beba48a57a20e173e15617d6743f2ae45b4d2a5148cebf22d478b86ec63ef77c3baa916f416a199dbf9fa3f127c78f7d03d064a6dd0fcedc9c5b10a8aed16295e646149133b9a59d54a96e07983cc27d830415d3525d62b19337c131f18cfbccc0b0e69ce8"}, 0x7c8c0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f0000000600)) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, r5, 0x800, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local, 0x7b37}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c4124000", @ANYRES16=r5, @ANYBLOB="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"], 0x2c4}, 0x1, 0x0, 0x0, 0x20004041}, 0x4048001) r6 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r6, &(0x7f00000000c0)={&(0x7f0000000000)=@hci={0x1f, 0x3, 0x1}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x0) 14:39:42 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xbc00}, 0x0) 14:39:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c10300000300000010050000000000000000000000000000480200004802000040040000400400004004000040040000400400000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000200248020000000000000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000026873723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ddffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000040000000000000000000000005000000090000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000028005443504d535300000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8010000000000000000000000000000000000000000000000002800697076366865616465720000000000000000000000000000000000000000000000000000000028015345434d41524b00000000000000000000000000000000000000000000000000000000000080756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e6331303233000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000092ce95f356e5ce490ba2235a857e9e701b23d73cecaa35b442536ba40ac524a26f4990c3efdc75b68a52b58c0421e4f7a888fab1e10e779b15d3e850b51eee9c2c1b193647659458db68a2dc5732a842b870aefae232a9a61eecf2d0f86363584e82f2e56e9261"], 0x1) 14:39:42 executing program 5: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) 14:39:42 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x6, 0x5}, &(0x7f0000000200)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_FLAG(r9, 0x0, &(0x7f0000000400)='ro\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000240)={r6, 0x8}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r10 = socket$kcm(0x11, 0x3, 0x0) r11 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup2(r13, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = socket$netlink(0x10, 0x3, 0x4) writev(r15, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) fcntl$notify(r15, 0x402, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x70, 0x5, 0x6, 0x0, 0xff, 0x0, 0xffffffffffff7fff, 0x2188, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x24, 0x4, @perf_bp={&(0x7f00000002c0), 0xa}, 0x400, 0x40000, 0xfffffff9, 0x0, 0x0, 0x7f, 0x52e5}, 0xffffffffffffffff, 0x7, r14, 0x0) ioctl$EVIOCGVERSION(r11, 0x80044501, &(0x7f0000000180)=""/65) sendmsg(r10, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = dup2(r17, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r18, 0x40485404, &(0x7f0000000380)={{0x2, 0x2, 0x400, 0x3, 0x3}, 0x8, 0xff}) 14:39:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xbd00}, 0x0) 14:39:43 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) [ 1004.302394][ T8495] xt_TCPMSS: Only works on TCP SYN packets 14:39:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x1) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xbe00}, 0x0) 14:39:43 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xbf00}, 0x0) 14:39:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x3, 0x1001, 0x0, 0x3}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}, {&(0x7f00000002c0)="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", 0x1000}], 0x2}, 0x4c000) 14:39:43 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:43 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1e) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 14:39:43 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x4, 0x0, 0x0, 0x10000000002) 14:39:44 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc000}, 0x0) 14:39:44 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x440000, 0x0) ioctl$SNDCTL_DSP_SETDUPLEX(r3, 0x5016, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f0000000080)={0x0, 'veth0_to_team\x00', {0x2}, 0x9}) sendmsg(r4, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000007c0)='ns/net\x00') setns(r2, 0x0) 14:39:44 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) close(r0) pipe(&(0x7f0000000280)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r4) close(r5) socket(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) splice(r0, 0x0, r5, 0x0, 0xc0, 0x0) close(r5) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[@ANYPTR64], 0x8) 14:39:44 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc100}, 0x0) 14:39:44 executing program 5: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20000008) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') unlink(&(0x7f00000002c0)='./file0\x00') 14:39:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080), &(0x7f0000000100)=0x4) r3 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r4, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc200}, 0x0) 14:39:44 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:44 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:44 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d82289ffa484"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:39:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc300}, 0x0) 14:39:44 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 14:39:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@sco, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x0) 14:39:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)={0xa, 0x4e1d, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0x2, 0x4e23, 0x0, @rand_addr="6193d03537e27ecf0365d059a1b2a260"}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @multicast1}}}}], 0x28}}], 0x2, 0x0) 14:39:44 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc400}, 0x0) 14:39:44 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:39:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES32=r4, @ANYRES64=r5, @ANYRESDEC=r2]], 0x0, 0x8}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0xc0, &(0x7f0000008ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008980), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008a00), &(0x7f0000008a40)=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x1f, 0x0, &(0x7f0000001500)=ANY=[@ANYRES16=r8], &(0x7f0000001400)='GPL\x00', 0x800101, 0x5c, &(0x7f0000001440)=""/92, 0x41000, 0x0, [], 0x0, 0x12, r6, 0x8, &(0x7f00000014c0)={0x3, 0x2}, 0x8, 0x10, 0x0, 0x0, r7}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, &(0x7f00000003c0)=ANY=[], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r7}, 0x78) r10 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r10, 0x89e0, &(0x7f0000000200)={r10, r9}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)=')selfb\x00', r9}, 0x10) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r11, 0x408c5333, &(0x7f00000002c0)={0x33, 0x4eb, 0x1, 'queue0\x00', 0x101}) 14:39:45 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:45 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc500}, 0x0) 14:39:45 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r2 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x88, 0x1, 0xffff, 0x2, 0x1}, 0x0, 0x5, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 14:39:45 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e24, 0x3, @loopback}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x9, @empty, 0x37ca}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0x40, @remote, 0x200}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x94) socket$kcm(0x11, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000880)={{0xa, 0x4e23, 0x768bf7cc, @rand_addr="35a083767ca6a284f2790494307de9b4", 0x9}, {0xa, 0x4e20, 0xff, @loopback, 0x400}, 0x9, [0x7f, 0x8001, 0x2, 0x2, 0xfffffff7, 0xdfd7, 0x2, 0x4]}, 0x5c) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000900)='NLBL_CALIPSO\x00') r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000840)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r5, 0x8, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x40000) write(r4, &(0x7f0000000140)="c937abfeb683201af8421783096efe465b949138a4ccfb2dff9c141694f21e4b4e95dc89e0cc68620d252812d136dfc46e38400bd2952ed4363415571c14238726a46390fe527b97cc44b763b8c44e534024fed00e95dddf7adcc77e32f6e25a6c39fc88e3acc6b0f5311a16d63c686c65dde9a81a78d5f50e7029c971c5db623603fa77c85b37ecc99a7ee3c5ead175e5829be60c6d32b318c6d8d2ce9c202dd650c21d59f4a343f5730738d0f4f13164a692a9513dbb35", 0xb8) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000080)={0x3, 0x1, 0x14, 0x1e, 0xd4, &(0x7f0000000380)}) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x4000000}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x12}], 0x1}, 0x0) 14:39:45 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc600}, 0x0) 14:39:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000080)={0x5b, 0xd, &(0x7f00000002c0)="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"}) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:45 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x7fb) 14:39:46 executing program 1: ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x10) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a0, 0xf0ffff) gettid() 14:39:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc700}, 0x0) 14:39:46 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, 0x0, 0x0, 0x7fb) 14:39:46 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x4201, 0x0) recvfrom$l2tp(r2, &(0x7f0000000180)=""/77, 0x4d, 0x2, &(0x7f0000000100), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCGDEBUG(r5, 0x80047441, &(0x7f0000000200)) r6 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r7, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:46 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x40000}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x83200103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) 14:39:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc800}, 0x0) 14:39:46 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, 0x0, 0x0, 0x7fb) 14:39:46 executing program 1: ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a0, 0xf0ffff) 14:39:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x7, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xc900}, 0x0) 14:39:46 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, 0x0, 0x0, 0x7fb) 14:39:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, 0x0}, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000200)="3100000012000900690006342fc56aef40c74408100000e446005c79cbb900540d03c000ec192dced88d5d5ae1673653b6", 0x31}], 0x1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000012003dc1001b44ae3000000028001a00fe800000000000000000000000000000ffffffff000023000000000000000000000000005b98c6935e6725131161fcdccc7e8d6e14e05c9efd208d178dd7c1faa104d7ea4c2984599e9e7cacfca204ed5519500d0f131cab4dfa233f26858e0cf6da815bbccb5c896e824a058c3a1fe0d92eedcbd0eb127b2e0cc5a1bfd16e076b8c6bca957e275b5391af3734c8abe137400ee5631a70b673a259d9c5cced4c65f21fbf9d86ea"], 0x38}, 0x8}, 0x0) 14:39:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xca00}, 0x0) [ 1007.917357][ T8692] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 14:39:46 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0), 0x0, 0x7fb) 14:39:47 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) r4 = dup3(r3, r0, 0x80000) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={r7, 0x3}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000300)={r7, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}}}, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={r8, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000080)={r8, 0x80, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x100, @mcast1, 0xe3e}, @in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0xaf66}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x81}, @in6={0xa, 0x4e21, 0x7226, @rand_addr="a13adb3e7881ac166bf53436fca483d6", 0x10001}]}, &(0x7f0000000100)=0x10) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r1, &(0x7f00000017c0), 0x1a0, 0xf0ffff) pipe2(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000500)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 14:39:47 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0), 0x0, 0x7fb) 14:39:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xcb00}, 0x0) 14:39:47 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x10) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a0, 0xf0ffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x5, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/bsg\x00', 0xd0000, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000500)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) gettid() pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 14:39:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xcc00}, 0x0) 14:39:47 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0), 0x0, 0x7fb) 14:39:47 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 14:39:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000080)=0x0) ptrace$setregset(0x4205, r5, 0x2, &(0x7f0000000100)={&(0x7f0000000180)="9ad553e4c76c461821a8188e2f97e08dce4a470d6441f52bc7f498b7d0e07ffbb51b84aff62d7c6ea12537e6041837f2cdf393fff6f7613355a9b660cf19450ea69db3ad0585666969a7bfd7cacffdd43cc436beded770196229020e3e1951859217fbb0db25cc122f7f8c7235ccdd1694824e15dff9daab063ea9b789bcb5fc9c71e1d6ab41d88d326af0faa269d01e446cd3402388c2f4f1a1e69b15934b54dcd3c2b983dd4b188ba36223933f41c685285a7db2e4cd330fb8a4af575eab549f52256b8a3a00dd4ee175bd2fe431295083c2d8d099b424b81c0c7757d28ef7a6dace9a6ae7801c6935abb2ccbc0e841cefb006", 0xf4}) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) 14:39:47 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x7fb) 14:39:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xcd00}, 0x0) [ 1008.720020][ T8730] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 1009.120552][ T8731] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 1009.164520][ T8730] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 1009.197357][ T8731] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 14:39:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xce00}, 0x0) 14:39:48 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:48 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x7fb) 14:39:48 executing program 5: ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/2, 0x2}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a0, 0xf0ffff) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x7, 0x0, 0x0) 14:39:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x4) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000180)={0x2, 0x4, 0x80000000, 0x0, 0x5}) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e11a25bd6787a0526d028a8b3000000000000a2bc5603ca00000f7f890000002000001f0101ff0000000309ff5bff", 0x48}], 0x1) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f0000000b40)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000880)={0x38, 0x0, 0x7, 0x5, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="9cabbf0400cbb140419b80008100501d0806", 0x5ee}], 0x1}, 0x0) r4 = getpgrp(0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x5c, 0xfffffffffffff801, 0x100000000, 0x6, 0xffffffff80000000, 0x1ff, 0xffffffff, {0x0, @in={{0x2, 0x4e23, @rand_addr=0x7f}}, 0x200, 0x8, 0x6, 0x7, 0x400}}, &(0x7f0000000700)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000740)={r6, @in={{0x2, 0x4e21, @multicast1}}, 0x7, 0x0, 0x6, 0x5, 0xd064}, &(0x7f0000000800)=0x98) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000008c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@empty, @in6=@loopback, 0x4e23, 0xffff, 0x4e20, 0x10000, 0xa, 0x0, 0xa0, 0xed, r7, r8}, {0x0, 0x4, 0x2, 0x1000000000, 0x1000, 0x4, 0x1, 0x2}, {0x9, 0x0, 0x5, 0x6}, 0x3, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@loopback, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast1}, 0x3501, 0x1, 0x3, 0x0, 0x1, 0x1, 0xce5c}}, 0xe8) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r11, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r12, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000800)=0xe8) setresuid(r8, r9, r13) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r4, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) read$usbfs(r2, &(0x7f00000005c0)=""/165, 0xa5) ptrace$peeksig(0x4209, r4, &(0x7f0000000080)={0x2, 0x0, 0x6}, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}]) 14:39:48 executing program 1: r0 = socket(0x11, 0x4003, 0x8) sendto$unix(r0, &(0x7f0000000000)="b10005016000009005001b0007000000000004fecea11ea8fef96ecfc73fff357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca02bbc257699a1f132e27acb5d602000d7d026ba8af63ff37282118e4fd89720fd3872babfbb770c136d244b4dfabcaa13c894303b22b310b404f36a00f90ff03000000000000c500001002000000000000020208a371a3f8000400000000000000010000000000000000", 0xb1, 0x0, 0x0, 0x0) 14:39:48 executing program 1: poll(0x0, 0x0, 0xf2) 14:39:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xcf00}, 0x0) 14:39:48 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x7fb) 14:39:48 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x0) 14:39:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) semctl$GETPID(0x0, 0x2, 0xb, &(0x7f0000000040)=""/164) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$kcm(0x11, 0x3, 0x0) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x5, 0x6800c0) 14:39:48 executing program 5: shmget(0x3, 0x4000, 0x100, &(0x7f0000ff9000/0x4000)=nil) 14:39:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd000}, 0x0) 14:39:48 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:48 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x0) 14:39:48 executing program 5: setrlimit(0x4000000003, &(0x7f0000000080)={0x7ffc, 0x100000}) 14:39:48 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x1723}}}}}}]}, 0x48}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@bridge_getneigh={0x20, 0x1e, 0x201}, 0x20}}, 0x0) 14:39:48 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x1723}}}}}}]}, 0x48}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:39:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd100}, 0x0) 14:39:48 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1, 0x0) 14:39:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd200}, 0x0) 14:39:49 executing program 5: [ 1010.222015][ T8793] device veth84 entered promiscuous mode 14:39:49 executing program 4: 14:39:49 executing program 5: 14:39:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd300}, 0x0) [ 1010.433974][ T8791] device veth62 entered promiscuous mode 14:39:49 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:49 executing program 4: 14:39:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd400}, 0x0) 14:39:49 executing program 2: 14:39:49 executing program 5: r0 = eventfd(0x0) ioctl$FICLONERANGE(r0, 0x5450, 0x0) 14:39:49 executing program 1: 14:39:49 executing program 2: 14:39:49 executing program 4: 14:39:49 executing program 5: 14:39:49 executing program 1: 14:39:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd500}, 0x0) 14:39:49 executing program 4: 14:39:50 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:50 executing program 2: 14:39:50 executing program 1: 14:39:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd600}, 0x0) 14:39:50 executing program 4: 14:39:50 executing program 5: 14:39:50 executing program 2: 14:39:50 executing program 4: 14:39:50 executing program 1: 14:39:50 executing program 5: 14:39:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd700}, 0x0) 14:39:50 executing program 2: 14:39:50 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:50 executing program 1: 14:39:50 executing program 4: 14:39:50 executing program 5: 14:39:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd800}, 0x0) 14:39:50 executing program 2: 14:39:50 executing program 2: 14:39:51 executing program 1: 14:39:51 executing program 5: 14:39:51 executing program 4: 14:39:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xd900}, 0x0) 14:39:51 executing program 2: 14:39:51 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:39:51 executing program 4: 14:39:51 executing program 5: 14:39:51 executing program 1: 14:39:51 executing program 2: 14:39:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xda00}, 0x0) 14:39:51 executing program 5: 14:39:51 executing program 4: 14:39:51 executing program 2: 14:39:51 executing program 1: 14:39:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xdb00}, 0x0) 14:39:51 executing program 5: 14:39:52 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:39:52 executing program 1: 14:39:52 executing program 4: 14:39:52 executing program 2: 14:39:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xdc00}, 0x0) 14:39:52 executing program 5: 14:39:52 executing program 1: 14:39:52 executing program 4: 14:39:52 executing program 5: 14:39:52 executing program 2: 14:39:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xdd00}, 0x0) 14:39:52 executing program 4: 14:39:52 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:39:52 executing program 1: 14:39:52 executing program 2: 14:39:52 executing program 5: 14:39:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xde00}, 0x0) 14:39:52 executing program 4: 14:39:52 executing program 1: 14:39:52 executing program 4: 14:39:52 executing program 5: r0 = msgget(0x0, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000010c0)=""/228) 14:39:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 14:39:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xdf00}, 0x0) 14:39:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) ioctl$LOOP_CLR_FD(r1, 0x4c01) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 14:39:53 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7365637594fd49024e6e7accd8862cbe29547fd17269747900060000000000000000000000000095a0561100000000000000007613267b47eecba00ae67dc713d50004000000a8040000e8020000d000000000000000e8"], 0x1) 14:39:53 executing program 4: r0 = eventfd(0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FICLONERANGE(r0, 0x5452, &(0x7f0000000040)) 14:39:53 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0xa0040, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dev/loop0'], &(0x7f00000000c0)='./file0\x00', 0x0, 0x1080, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20402, &(0x7f0000000100)='!loppp1em1\x00') 14:39:53 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000080603000000000000000000000000000500010007000000d3e5a6e59014e16c4cebef1f6adbefffadb53aeae91726285b9e85c97b59a9a40aa7bfd9df9f49a8e16780b7c7424ce6b839ba785cf70a6bfc17d3260223bc0afbf5ef0b4cc7ee4daacb050cae0260720487994b7c29ddbe3b851bae2131e73841b7d01d69edcb8c0430a39585679205000000eafc80a22c60f6f0e5e652d56f285f4f2a9513b7254306da439159fab84ba66771172d2a3eacc5fc624237c693f6000000000000009c436ef61b6968"], 0x1c}}, 0x4) 14:39:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe000}, 0x0) 14:39:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="bd", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") shutdown(r0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close(r0) 14:39:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe100}, 0x0) 14:39:53 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x8}, {}, {0xfff1}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x10, 0x2, [@TCA_CGROUP_POLICE={0xc, 0x2, @TCA_POLICE_RESULT={0x8}}]}}]}, 0x40}}, 0x0) 14:39:53 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x1c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r5, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x1c}}, 0x0) 14:39:53 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x3d8, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001600ff8e0000000000010000000000001800000014000a000000000000000000000000000200"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmmsg$alg(r0, &(0x7f00000000c0), 0x49249249249265a, 0x0) 14:39:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000400), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x10001, &(0x7f0000000100)=""/128) close(0xffffffffffffffff) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0xaf02, 0x0) 14:39:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe200}, 0x0) [ 1015.092479][ T8991] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 14:39:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000001c0)={0x0, 0xf, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r1, 0x703}, 0x14}}, 0x0) 14:39:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:54 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) write(r0, &(0x7f0000000100)="1b0000001a005f0014f9f407000904000200000500000000000000", 0x1b) 14:39:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe300}, 0x0) 14:39:54 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) 14:39:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000000)='\x83\xe0\xaa\n!D\x90dS\xe6\x162\xad\x00\x00\x00\x00\x00\x00\x00\xc9#\x06\x12') 14:39:54 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:54 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe400}, 0x0) 14:39:54 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r1, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}]}, 0x28}}, 0x0) 14:39:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/handlers\x00', 0x0, 0x0) 14:39:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe500}, 0x0) 14:39:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000a80)=@allocspi={0xf8, 0x16, 0x337, 0x0, 0x0, {{{@in=@remote, @in=@loopback}, {@in=@empty=0x5, 0x0, 0x32}, @in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8]}}}}, 0xf8}}, 0x0) 14:39:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe600}, 0x0) 14:39:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000a80)=@allocspi={0xf8, 0x16, 0x337, 0x0, 0x0, {{{@in=@remote, @in=@loopback}, {@in=@empty=0x5, 0x0, 0x32}, @in6=@remote}}}, 0xf8}}, 0x0) 14:39:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:54 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') syz_open_procfs(0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) ppoll(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x10) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0108000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:54 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') write$sndseq(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:54 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') write$sndseq(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) ppoll(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r4, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) 14:39:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe700}, 0x0) 14:39:54 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) gettid() ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:54 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) dup2(r1, r0) 14:39:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r4, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) 14:39:55 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x80000000}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) write(r0, &(0x7f0000000100)="240000001a005f0014f9f407000904000200000500000000000000000800020000000000", 0x24) 14:39:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe800}, 0x0) 14:39:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x8090ae81, 0x716000) 14:39:55 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="b7"], 0x1) lseek(r0, 0x0, 0x3) 14:39:55 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file1\x00') 14:39:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='ocfs2_dlmfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) 14:39:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xe900}, 0x0) 14:39:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xea00}, 0x0) 14:39:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x100, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) recvmmsg(r0, &(0x7f00000197c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x45833af92e4b39fd, 0x0) 14:39:55 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') syz_open_procfs(0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) gettid() ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={{0x14}, [@NFT_MSG_NEWRULE={0x628, 0x6, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_RULE_EXPRESSIONS={0x4c0, 0x4, 0x0, 0x1, [{0xd0, 0x1, 0x0, 0x1, [@numgen={{0xb, 0x1, 'numgen\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_NG_OFFSET={0x8}]}}, @notrack={{0xc, 0x1, 'notrack\x00'}, @val={0x4}}, @log={{0x8, 0x1, 'log\x00'}, @void}, @target={{0xb, 0x1, 'target\x00'}, @void}, @dynset={{0xb, 0x1, 'dynset\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_DYNSET_SET_ID={0x8}, @NFTA_DYNSET_SREG_KEY={0x8}, @NFTA_DYNSET_SET_ID={0x8}, @NFTA_DYNSET_TIMEOUT={0xc}, @NFTA_DYNSET_SREG_DATA={0x8}, @NFTA_DYNSET_SREG_DATA={0x8}, @NFTA_DYNSET_SET_NAME={0x9, 0x1, 'syz2\x00'}]}}, @range={{0xa, 0x1, 'range\x00'}, @void}, @redir={{0xa, 0x1, 'redir\x00'}, @void}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL={0x5}, @NFTA_OSF_DREG={0x8}]}}, @socket={{0xb, 0x1, 'socket\x00'}, @void}]}, {0xf0, 0x1, 0x0, 0x1, [@ct={{0x7, 0x1, 'ct\x00'}, @void}, @match={{0xa, 0x1, 'match\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8}, @NFTA_MATCH_NAME={0xe, 0x1, 'proc)self\x00'}, @NFTA_MATCH_NAME={0x8, 0x1, '#$$\x00'}, @NFTA_MATCH_NAME={0x20, 0x1, 'mime_type#vboxnet1\\vboxnet1\x00'}]}}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_DREG={0x8}, @NFTA_TUNNEL_DREG={0x8}, @NFTA_TUNNEL_DREG={0x8}, @NFTA_TUNNEL_DREG={0x8}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_MODE={0x8}, @NFTA_TUNNEL_DREG={0x8}, @NFTA_TUNNEL_MODE={0x8}]}}, @limit={{0xa, 0x1, 'limit\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LIMIT_BURST={0x8}]}}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @void}, @dynset={{0xb, 0x1, 'dynset\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DYNSET_OP={0x8}]}}]}, {0xb8, 0x1, 0x0, 0x1, [@dup_ipv4={{0x8, 0x1, 'dup\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8}]}}, @hash={{0x9, 0x1, 'hash\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8}, @NFTA_HASH_MODULUS={0x8}, @NFTA_HASH_TYPE={0x8}, @NFTA_HASH_TYPE={0x8}, @NFTA_HASH_TYPE={0x8}, @NFTA_HASH_SREG={0x8}, @NFTA_HASH_OFFSET={0x8}, @NFTA_HASH_OFFSET={0x8}, @NFTA_HASH_DREG={0x8}]}}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}}]}, {0x10, 0x1, 0x0, 0x1, [@meta={{0x9, 0x1, 'meta\x00'}, @void}]}, {0x234, 0x1, 0x0, 0x1, [@fwd={{0x8, 0x1, 'fwd\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_DEV={0x8}, @NFTA_FWD_SREG_DEV={0x8}]}}, @notrack={{0xc, 0x1, 'notrack\x00'}, @void}, @target={{0xb, 0x1, 'target\x00'}, @void}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @void}, @fwd={{0x8, 0x1, 'fwd\x00'}, @void}, @bitwise={{0xc, 0x1, 'bitwise\x00'}, @val={0x1d4, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x68, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x62, 0x1, "37fbfde11e0618ba8bc98c700addb2931abacc6e44e8b0cce7f2acebe3841ad86495f6a23a0d7f918ed031ddb9a6efd358c91eb08a6f8971a9ee7e23e6e91153137760862f0e17b8c16463bb928c3a1341f2b2b20ce4371aa8d4c3f7f01a"}]}, @NFTA_BITWISE_XOR={0xcc, 0x5, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xe, 0x1, "bc6eb8a6aa03975e4bbf"}, @NFTA_DATA_VALUE={0x2c, 0x1, "8b30e6eec0c58726f5d2219352e36fc20d9be0dc22c1e88c9f467b8186ba506555fb086845e7d714"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x33, 0x1, "0b8d49dc6596118a13a344ace5c177ccb4964e66095d71bbb98fbfe7bcd3c94c2fbe2769f4a26c44e365a3fb97d1dc"}]}, @NFTA_BITWISE_LEN={0x8}, @NFTA_BITWISE_XOR={0x94, 0x5, 0x0, 0x1, [@NFTA_DATA_VALUE={0x69, 0x1, "7291bca43ea2847e42621f0a07de808031ab20665dd1266bfa90c91f7d159da9ddc6537f6362a09395cc1f07b428c4fbacb91a020608a0fdf6835e3564d4affcf78ee99a6e96a242e8102e5a9a350c3133959a9573d8f46eacb8e8d5f2707013180b936e0c"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}]}}]}]}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_USERDATA={0x66, 0x7, 0x1, 0x0, "5614c3a98851769ee80f2037abe20471e4cc7b8b80f3cc7b83bb059f994079432f731bd1dd2a476499c9e283f3ee211a79f2edfeafdb83465bf447603b727c262342b376af385641a7b23feb150fb597866b9aa6aecf4105b8e1fae4a50901e83829"}, @NFTA_RULE_USERDATA={0xd8, 0x7, 0x1, 0x0, "953f9c1cc2acfa7d3711da7d792b65323b56918f1f62ea2bd9ba47291e09ca1dde69a71d477bd73e25855a559088f34f3df7811feda74b505f7cbfccf297addfd4114f11a54015208e855490131e7b9fcf5057074bf8062bb392feac7d801e1d84460dfb1ca3e70b266e1d4b9085fdab275afe4620196d893d19ff2257905d3113613a40b50b0d37316d549b76c7586f7a08fe73ecc960ae82b9aed354017a229ec51806545a752423594b5b4272aa8aad3083f58b828f796b2c48c4ef11fd88e93c62b0a2309ec4031d3e170b2352d29580b8a3"}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x48, 0x3, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x5}, @NFTA_HOOK_PRIORITY={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x6b8}}, 0x0) 14:39:55 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') write$sndseq(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) gettid() ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x10) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xeb00}, 0x0) 14:39:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xec00}, 0x0) 14:39:56 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') syz_open_procfs(0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) gettid() ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:39:56 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000001380)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000180)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff02000000000000000000000000002100", 0x2a}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0xc004743e, &(0x7f0000000680)='&@[\xc8') mkdir(0x0, 0x140) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x40047459, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 14:39:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xed00}, 0x0) 14:39:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x3a, 0x2, 0x801}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r0, &(0x7f0000000440)}, 0x20) 14:39:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000500)='cpu.stat\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000ac0)=r3, 0x8) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:39:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/395], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:39:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xee00}, 0x0) 14:39:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:56 executing program 5: r0 = socket$kcm(0xa, 0x1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffff58) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89f2, &(0x7f0000000000)={r1}) 14:39:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xef00}, 0x0) 14:39:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:56 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000500)='cpu.stat\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x75, &(0x7f0000000ac0)=r3, 0x8) 14:39:56 executing program 2: 14:39:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:56 executing program 5: 14:39:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf000}, 0x0) 14:39:57 executing program 1: 14:39:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:57 executing program 2: 14:39:57 executing program 5: 14:39:57 executing program 1: 14:39:57 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:57 executing program 2: 14:39:57 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf100}, 0x0) 14:39:57 executing program 5: 14:39:57 executing program 1: 14:39:57 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:57 executing program 2: 14:39:57 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:57 executing program 1: 14:39:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf200}, 0x0) 14:39:57 executing program 5: 14:39:57 executing program 2: 14:39:57 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:57 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:57 executing program 1: 14:39:57 executing program 5: 14:39:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf300}, 0x0) 14:39:57 executing program 2: 14:39:57 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:57 executing program 1: 14:39:57 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:57 executing program 2: 14:39:57 executing program 5: 14:39:57 executing program 1: 14:39:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf400}, 0x0) 14:39:57 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:57 executing program 5: 14:39:58 executing program 2: 14:39:58 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf500}, 0x0) 14:39:58 executing program 1: 14:39:58 executing program 5: 14:39:58 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:39:58 executing program 2: 14:39:58 executing program 1: 14:39:58 executing program 5: 14:39:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 14:39:58 executing program 2: 14:39:58 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf600}, 0x0) 14:39:58 executing program 1: 14:39:58 executing program 5: 14:39:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 14:39:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf700}, 0x0) 14:39:58 executing program 2: 14:39:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:58 executing program 1: 14:39:58 executing program 5: 14:39:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 14:39:58 executing program 2: 14:39:58 executing program 1: 14:39:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf800}, 0x0) 14:39:58 executing program 5: 14:39:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 14:39:58 executing program 2: 14:39:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:58 executing program 1: 14:39:59 executing program 5: 14:39:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 14:39:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xf900}, 0x0) 14:39:59 executing program 2: 14:39:59 executing program 1: 14:39:59 executing program 5: 14:39:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 14:39:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xfa00}, 0x0) 14:39:59 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, 0x0, &(0x7f0000001000)) 14:39:59 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, 0x0, 0x1ff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:39:59 executing program 5: unshare(0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) accept4(r0, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:39:59 executing program 2: rt_sigaction(0x3c, &(0x7f0000000280)={&(0x7f00000001c0)="c4615c550d30fcea203ef2afc4c1be5eaae19600006766400f38db0a3e652e660f3822701a46f73506000000c4417e126ce09966440f289700000000c4c27d19a45100000081c461fd14698f", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 14:39:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) 14:39:59 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x11, 0x0}, 0x78) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x134}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/60, 0x3c}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:39:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0xfffffc7e) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 14:39:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) [ 1020.780888][ T9380] ptrace attach of "/root/syz-executor.1"[9379] was attempted by "/root/syz-executor.1"[9380] 14:39:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) 14:39:59 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0x8, 0x0, &(0x7f0000000000)=0xfffffe74) 14:39:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xfb00}, 0x0) 14:39:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:39:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r2, 0x0, 0xfffffffffffffee9, 0x0, 0x0, 0xf1b9100e736645d9) shutdown(r2, 0x0) 14:40:00 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000001040)=""/4096, 0x1000}], 0x2, &(0x7f0000000ac0)=[{&(0x7f0000002040)=""/4096, 0x1000}], 0x1, 0x0) 14:40:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) 14:40:00 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x33, 0x0, &(0x7f0000001000)) 14:40:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xfc00}, 0x0) 14:40:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xfd00}, 0x0) 14:40:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c", 0x71}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:40:00 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:40:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[]}}, 0x0) 14:40:00 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x20, r3, 0x4c88cd1b8aee033f, 0x0, 0x0, {}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, 0x20}}, 0x0) r4 = gettid() tkill(r4, 0x3c) [ 1021.703536][ T9424] ptrace attach of "/root/syz-executor.1"[9423] was attempted by "/root/syz-executor.1"[9424] 14:40:00 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, 0x0, &(0x7f0000001000)) 14:40:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xfe00}, 0x0) 14:40:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[]}}, 0x0) 14:40:00 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x43, 0x0, &(0x7f0000001000)) 14:40:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xff00}, 0x0) 14:40:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[]}}, 0x0) 14:40:00 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r1, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x1) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 14:40:01 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x12, 0x0, &(0x7f0000001000)) 14:40:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:01 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x49, 0x0, &(0x7f0000001000)) 14:40:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) 14:40:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0xffffff1f}, 0x0) 14:40:01 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) 14:40:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) 14:40:01 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4b, 0x0, &(0x7f0000001000)) 14:40:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x2}, 0x0) 14:40:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:01 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006fc0)=[{{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002e80)=""/137, 0x89}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x259, 0x36) 14:40:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000000000000000000", 0x58}], 0x1) 14:40:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) 14:40:01 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") rt_sigaction(0x3c, &(0x7f0000000280)={&(0x7f00000001c0)="c4615c550d30fcea203ef2afc4c1be5eaae19600006766400f38db0a3e652e660f3822701a46f73506000000c4417e126ce09966440f289700000000c4c27d19a45100000081c461fd14698f", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 14:40:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x3}, 0x0) 14:40:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:01 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r0, 0x0) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x1) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 14:40:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141431e8", 0x0, 0x9}, 0x28) 14:40:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a010500000000"], 0x1}}, 0x0) 14:40:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x4}, 0x0) 14:40:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a010500000000"], 0x1}}, 0x0) 14:40:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xe, 0xe, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@call, @ldst={0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffff0, 0xfffffffffffffff4}, @jmp={0x5, 0x0, 0x0, 0x2, 0x2, 0x10, 0x4}, @initr0, @exit, @jmp={0x5, 0x1, 0x6, 0xa, 0xb, 0x100}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172d0275}, @map={0x18, 0xa}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4}, 0x10}, 0x78) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000280)={'veth0_to_bridge\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141431e8", 0x0, 0x9}, 0x28) 14:40:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x31, &(0x7f0000000040), 0x52d) 14:40:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000027000523a4abd32b8018007a0224fc60100002400a000200053582c137153e370900018003001700d1bd", 0x2e}], 0x1}, 0x0) 14:40:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a010500000000"], 0x1}}, 0x0) 14:40:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf}, 0x0) 14:40:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x159, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d008104e00f80ecdb4cb902020000000100000081000afb12000100040fda1b40d819a906000500000f", 0x33fe0}], 0x1, 0x0, 0x0, 0x10}, 0x0) 14:40:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141423e0", 0x0, 0x9}, 0x28) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 14:40:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f00000004c0)=0x4000) close(r1) 14:40:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30"], 0x1}}, 0x0) 14:40:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141423e0", 0x0, 0x9}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) 14:40:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf0}, 0x0) 14:40:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30"], 0x1}}, 0x0) 14:40:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @dev, 0x9}, 0x80, 0x0}, 0x20008840) 14:40:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:02 executing program 1: perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8f533b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x7, 0x3}, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r2, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x101, "2b04ec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0x11, 0x7, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x4, 0x0, 0xfffffffffffffeb2}, 0x35e4ed281d171825) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) close(0xffffffffffffffff) sendmsg(r4, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=r3, 0xfffffffffffffec6) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r8 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r8, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r8, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r11 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r11, 0x1, 0x3e, &(0x7f00000002c0)=r10, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe527bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957671d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f09e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07ebe3b29f272e87c414aeed9a469387e755d98bb89d9609747ded2e827e66f32b2120adaf31193181d1746d4a986648c134ce6f6b530eeb03dc78e658db44240cfe85b7e9c66c7"], &(0x7f0000000340)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x54, 0xfffffffffffffe09}, 0x28) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xb, 0x202, &(0x7f0000002b80)=ANY=[@ANYBLOB="079ffbf4a20300000000000000ce1e5ec2236f10c88a839b74071297e52888a32f4cca85cbc3588591c72780bd1ec0beb70c9ccb8721116f0e8575058856e003f540c2e61294c63624b4f5079dbd72867c886321e20473607e9bcb8f860396c7a2eba8dd7f943da9d6fc3a4397c5dd9fccf7fb646f903c3add864d3acf37bfbe98857d95a85de9868fc6eaac1f1d716480d26a9cf4ac05db1f5fb52769e49a05ebe72ffd488650ae0a8b8520de94db2f71392110f819101bda44f601561201e31d21b56acf2cc4c988165d3638256d0897776258f1f81cd8cfa9f87860f7879ff7c7895ad4e333bb1bf495cf7cbc9ba7464858d4cc2e45a26f472789d1fc4c524094f7ba55ecf66c94268d189a74f47c2da8b18e3b9df92bc95d41ab902b5c289029944e2c1e783e4bbe935d43e84aba59cbb083e842365fffbd053156e33084bf50370cf6d82b89d2511ed8184ff4cfdc8f5a632dd670853c506ce2a42d067e509db1c25d7af8aa0c910d858de7310cc72bb22294a701c0796d7356321eb0ef30d842ba8fc7cf79622d57438696e7a71979d16e00589bf17b0cd5d1e5ab65bbe9119586c34479c08ff432ba33ff5bdaaf6cb8ad753ecfad35fa4540f1eca0deb40d26273396df67d5e3591bb41ed29e3ca99476b2f4fc4dfd4237238c8aef31bf58feafb98d76919d666bfca08a36cbbddeecbfd6ee2d8ba6d73111141e0f3c8b637f2454c6012abf48eab3b3bfe6ccbde357262e3638a5079123cfb52cdcb0362faae7ae807af5589181f503a4d51dcdf8e64671be9627efa436b06e13f70426b2bcef9716a3d78ac66da882fc06e59d43f1a551243e29fb6fd784fc3d642804b5ee7c37b0c28bc8a1c0ae7953e0156db11e28f3ae158a605992b07ee5ec2c9387a0ed3074f2dd67fccce07e1a002b14664e4843e5a7056ea3f03d561b5c1dcbce6fd80bbeca226e0370f7b4e91ec63985dd240dc7da41637a9c0f3ac73c05b1aca7fc453a1c6e7a2cf6a9b08229dabc3b5b61f66a569dff5a60efc41108592d03934095cf6561cecfacd4abb886c6ce17398fcb511f0e25199d287c7c8696684527dae4d548640d9e6ac95dfcdff842092d2e2b17d059817a66c8e548e0fd5483df83b055d4408e5e54a3413c7ff37cc1ae49b47fe0282348a5081aed1f1adcc9e7d89038c18db5c22e593e6d37fd0b7d9c5999746dd945c09463f5f71ebd28fe6ef3739eb3ce0f40c519bb57a42166c09a368ff161f79a0d620dea1cf1360eda98cb1e612b457c6cdcf8d0e42c091699c01b4c2b508dd24414a5769cb833d9d7564689fd6684266093da77e1fefd536b2c8be25a1b3a517c39c548730cb539552fe2c8d3ca9262b2f4f8e7088e2dbea4e1c9fd7e1e20fe2e63ea0c9f8f23ef986b8809b3fef6ea29c6e3b8cb579ee685abb821d219ff71949831c1e06da3a1927f7df4992e484181729acb78dce7a6d26a925eb770af41c968a1018a518ef6da4b6d18ff584120ea2ea90ce3393ef88d175ace9dc8a2fcb173557ebf59e94af3825ba2a08474a28006b0df080d7e90e1b0be37a780581cbb67ffb2966f248163a4f0b9ff159f48112a8cd9e5fdf3912e0bc1bf223ee2d270e7e43bb056d1eaff40796a214c7b73d7929c4a6dbf9c49a51b8858657c9ee73ab3b0b599174771b63a0303e7751bdc772990c542fee83f25e9e7ec303d0a60b6d6dd3be3cdef0bd54b9ebcd5e7b983f991cf558f98499871013fc48dea33bb2f8c7fe470d532c1a7ae800a36454f7af2f38610c87f59409b3eaba4910e5c841e0b5172214052096c70a10af502e2c883f041d77d52635330e4de9a557c9e432dfeb90cb39944d3c1320dbf7b91a4a6b237f88a3b1468dc922b4eebd06c5783c81f949feff76ef8cef82891c0c37baeabc3ed29dfc3e8bc706f3148b9b9967b31281ba3a97fd83bb42e16c162e241e48800d4311fce6e4eb6df0ee1523f59b8f0b557740c95d4a707033c3655506b949084975f4954e3bba7a040f73485db51ca4de7bf914b23a24584967ab0218b41ee5ba5fd34e49441711f72265914822939afd82d00b94cdde44efa325f25ca50b5a78af94b9a65591379081f4394c85f47f18fe3a5d40f2ae17f214296c75854a67abf6e5f620999648549b1d76cc0dd3aad12f14f651898dd0a3c4647f850229403f328a7ccaa48ac51590f00228dc4239e2a9354b618acc73c9917ef845e6717f8911cbea8912cdc4f5fcc635c5ba224d157f7b99fff757b224f3e843cf56136c7157fc8b5db27c325970f176b7b9d81ab3481c21085c92a1410c4c736ad0f5819ceed0d3cdd90ac636fe02903e4cc3616d6ae7d8de66da6f8fff910fb4c3df12fade48c6763726fa900eea9abce2bee79ce8ae2a4f7833f1b43c0fee565e45e48ddc9705082cb239ea152e1b0d422b013dc08a2259e945710688350e6ee68262c410739c2786f1cc6206b1a43607aa787919e39c50586a68eeddfb1dfde361ee33b34fe2d2d74a67f665bf5467cf16ceeeb76a96366f10e7f62c1db673102dc23ec37da375248d5e76bf31c253334f0840fc8744589802f65d453a1cf771d5c6c369b95937ba597faf8c8a325c9ade109eb172d8727eb6c778d0a70f46bb82643dca96adae0527ee892f0491dd392d0380e4f4f99802d827fba8c11f934ff8dc382b1d42664b5ad08af6640657adb0d1125818752109ec2b922ea72cea997032fa012c3e6697999f5e3d066687f155c85ce9cdbfa5f316a973bc0b1255a7aeedba3ae4eca60670c7aeb8748498c36f9395f033523945c018545fcd71073547366f1bac3a99edf1d7da14e9c0e69807358fd76bc86d8f1ff3ee6dbf21c80ad27e68622658d30a88406a3cc7f21d073f93df9177d81876a4c11eb205a3ea4d71081a6bcd65e916ab2b550edf026153697d01aca18e676e9dc8e7d5b63d99f9cf9388417e7692ebe0feb50dc70a4bd5c25b83c8e8ffb7a7027a1784b7a36208c70b629657631d2a66538342b0f8273bd5dbb2ed9e89a406896c360b51bf9e22c7fdc8fbbae9fbe579db856d667ecd22bf2471f9eeb9ecd91d39e2de42a197eecee21858647cd70cd685b2659b1c35be59be833680d5cc9b6dc71049751b721235701a7522b2dc3dc25235c66bed3938b7c04352b3328a3b9b0db68f9c326d9389a691a89061aefca72d733c289be7e194c735f01b60fe68f0ecb622db5ff80d82a7347a6218ab1c66bcec8c87f01ecf3119a8fdbc752a3377d291a8e45f9d2fce77805f7a2c4c6b8611d706e2cb7206860462be71836f7c69f4da24a1f4f0a9d1864dc8c1432d40cede75e131722aee0272f0bd37704cca833aec9526f0e6361cb49a5c8ae4bfe1cce30eca68cd5fba5791192532f308a26bd1ac4d454ec6ae3926a26ea0fc3c4b54bae9bbfb65b6b5204eb647c2cf67ab3869710450490349216d9cd2ed87d85e0ee99efebc18631d2e4a4a3128db84c5f2c519fa8d4318d228941932b6a7691ae03b1cad55def4cd3c49cf2bd548c57afb2f3fa13eaf7a9f337170e3043c66936244315dd673d281531ea706633f8cc7c05a0a10f7c1793e05193312c67221969617f09dce9185da938e62d709dc5fe5caea5bdc225f19eb94d4562d933c8a141a4e3363842589818e9098afa2ef8bbe66a615b57491fd3a016882cb1097dc4286e235445179f71da1012a1d5a391b35b7739f84a34726053b738b0b18f4e625e13e6631a3f60357898621abf93c6317406aabe6901efae9b41734a17c4069ab9e4cc0614b0c490283fb72263789fbf3f21734f130a30918cde75a18ee1a3284c59ebd045711312a8507395fb08c117c549855d50a1dc4d13fe648032cd3c570ab7ca09f67f3c1e604e7b88b3c956145e3fd750f8b98708cbc0b3be78439b5ac87c1a4f206d9bbb05d8d3ff4298502233ed01b51a75b9f4493888ec17b85f2690582ac3fe763bea276bce9767589b4abd22115a71d5ad3e37e2d34f47faa3dfee27217df085afaf1cd39ab9c2dbe9d788d1b2ae9866f75719f0147dd1a14f836cadd62f2420c8097460dff2d436114736b75f85245935a15ece22ac31b16be35693f56313d8796b324f9fb1b5a832122916abda1fa4eec9cba9951a56f4a13f93927718eb2122580fe16c5a624e63dd390787172664bb62a98c1b4336954dacad2684876735b910b9bbe9481992ae4c5cfb233ede3268ce99c75c464b94d0367951e64053d475def1f53b434606dee5f5352be9259d81c72591b7b063586214257c9e5de2e91fb0ca746698778e0b5f0dda96065425d90cb6252fea6ebe4fe05f8d6054b0a12ed1dfa602d8bf1d3111ccdcec766ea68bd9eedb9a7acf04bf52e1f7d3982fede7b761228003d3d490a3d4515291e2213567e82fa2e734e1cafc884520fccbe69016d58e0d8803617ab0c96dcc880d4ee5ac3bb3a95b08920c5af7507aa9b6c13c6e3cb7deda44fbfc4ef7afc892fc50b888057733b978b178e47e4973b70c4ce41d773d07b3d5338f484eaf88aaf5edce610bf4c26e970e1e64df128b4c5d5bcd2ec5d59672bb2ef1e7c848a824e61fcebbd9950cc8f16c9bd767f50c5f425e3d7ea0884c0d400bb5cf09787be590b49f2dd8d438c33b6fa923c7fe1147e12b914f2273125f68ecd7df3837ce31d35deea136dbb1b78158b3108e960ba9cc2fd2d168c3497e4474a10a9ad6e37a97292c8e52bcba8a3d6f0e68b6270f761debee52d44d63aceff1b2c358e6a03e69ed41b6914cd33f2e19cfac3142a203a3347bbb3324624daa780dfd800105d0cad84511f0783310f0fe24b2d04d5b6826db1429a0fa64f5410e9dbb1033121b7beec1ad94428dedd69df0b479413e37b4930653317353ce56d1456abbe44a14cf56f8c852053098d1d15cd4415d80e28cb21c36802512ee2a1569234d8ae35475274943ace27f2764673364956862a252ab1e220a1d7ee26d6a54f6a25a62aa71490c0d5ca99fc05030e31a3096d2f786a53719cff852f50b841c9f7bab236c2ce5e4f5b55ac4235b479f6ca1c97146bfdaf206cc0a6f26a5dda13b7480b7e81079bcd8b0c312512bd483e01cf51f72c0193c34f3bc48d03cf4fe2d21568a2a5164525563bcc53ac51876a367657cbb928e0e99268b701b6355795d0d85f24431751321bd0ce3807fbc44e9e9f66fac5ba4c721ac6a4837cf42dfa3537d8aa2c795349c7fc1953d3816de40688011e9e0296dda9cc8e81d2efc98ee529d2cfad2bad922585a594203ce9e645a298565d14da2d37172b659e4daa5f0d0ff05e851bcde4341775f28b157521b3e9b8bd2d2381d68fe410cdf87a08e7c312b6eee3af61f741e292a31a2b15af9f301fb2a0baab5139f7a294efab10a12f195749c2717caa1f7d7ce6d93ebb5d409cb1583169db9671091d93da1d83ccb3a3565098810aef2eae1462a4fc1608c5e4d8c4ff0eb266498bf50c518e770d2611d5f840c6b434e54661af835c261209525b2525dfc2076e7f7fb1af60a529d37daa82fdeeeb58eb0b987c3c7a6142170464660ca0ad83ecac1f38935c7e6fbca96c8b53d714306fe21de3653e2117745f80f15b1538be3cda15557fb0c807ca610fb4f1d2d00a284b267694bd27513be9c880dfa09c0ba737de89a12b0beda1cb38e8c1039fa6d38cd04ef0ca2b59f2ef00bf215cd100aedb16e51738033550000000000000000000000000000000000000000000000000000000000000905695a60917b046dd577d98f60ddfe2347f5b403929d742c67dbb56121394934c5e0c175e5e2a56a0ab73a1b46d2b4900000000000000000000000000000c447d500d74d05db1d088703dc4d8620e571e4bbf5f3255b8ff35e1dd7426544052f2d66c8de06d145858794d7e4decacdb258ba1aebb500974c38e3420abd96f8f0b1be725b702ff3ed8299f21afdb68410df21de19cb2619a021cbaa2a37c1443e1cb200"/4239, @ANYRES32=r10, @ANYRESOCT=r1, @ANYRES32=r5], &(0x7f00000002c0)='syzkaller\x00', 0xa8f, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0xc, 0x80, 0x4}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000500)={r5, r13}) socketpair(0x0, 0x0, 0x0, 0x0) 14:40:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x300}, 0x0) 14:40:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30"], 0x1}}, 0x0) 14:40:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @dev, 0xb}, 0x80, 0x0}, 0x2000880d) 14:40:02 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x17, &(0x7f0000000200)=r2, 0x4) 14:40:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xb5f}, 0x0) 14:40:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a3000000000080003400000000114000000"], 0x1}}, 0x0) 14:40:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x8, &(0x7f0000000040)=r0, 0x52d) 14:40:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a3000000000080003400000000114000000"], 0x1}}, 0x0) 14:40:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xec0}, 0x0) 14:40:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="2e00000032000502d25a80648c6356c10424fc000c0000000a000a00053582c1b0acea8b09000180feff0000d1bd", 0xc0}], 0x1}, 0x0) 14:40:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x15, &(0x7f0000000200), 0x4) [ 1024.408613][ T9613] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1024.443772][ T9613] openvswitch: netlink: Message has 5 unknown bytes. [ 1024.483381][ T9617] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1024.491804][ T9617] openvswitch: netlink: Message has 5 unknown bytes. 14:40:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141431e8", 0x0, 0x9}, 0x28) 14:40:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a3000000000080003400000000114000000"], 0x1}}, 0x0) 14:40:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf00}, 0x0) 14:40:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e4800001900056bd25a80648c63940d0124fc60100006400a000000053582c137153e370907018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:40:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f9230dcc401356abab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac7259945671b2e6f3fe011dee18f6b8ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2edb9ea85c28d5aa89f51b4e255bb8f1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee18270d5a370ddeeb6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2faffc836c98b58cf1fe50917b2c6b05e6001c29d7ca47dc400000000000000027bc50e40a369aba3b08f0a8620c4d29eff84094a28a6cb9fc8e7d360fced56ead5fa0c52f90ba859937a013f894b2a0ee4deafb888ed8aa8d5d70cf2ec06edc22ca72157003b8beb850e2007f6118f6df8235d0fe1428c367c2d625414413dc42d6e26f9451bea114b2fab52604d025d4a6b727e1cd4bd9c6e123e37c81956907845352068bc40073b07ebe8e704c3acd631d0c0a28ead446e09eca3f50326f1c17c424fd594ea674c663d966a60200000026b1d399cb5a780895cf5a73ba00133133bc94fd468a74751e171db637a8e734e94685022fdb9d018d317f00d42483b51802a944647ff54ed81351bfa04d91727542250b521f6891dd92449d17f0d39036cf04eacd4c4269e1f3229a496e83ac4df79cd24e6bc485d305191331e9d6a23842a6dd1e780eb4ed6d249c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141423e0", 0x0, 0x9}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1024.932441][ T9628] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 14:40:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000"], 0x1}}, 0x0) 14:40:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:03 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) ftruncate(r0, 0x0) 14:40:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x4000}, 0x0) [ 1024.980099][ T9628] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1025.008410][ T9628] netlink: 16638 bytes leftover after parsing attributes in process `syz-executor.1'. 14:40:03 executing program 5: socket(0x18, 0x1, 0x0) getpgid(0x0) r0 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="0000751d6270b70000000000f4eef23867733c00000005000fb50acbd1fa43982607fafe50ce767464ca7f00000000080000000000003e00000000000100005e65de4f8c4e0e1c0633197ed1f3c9056ce5b57ac45603a02c8eae4564fffd8e50c5e5d3bbab711fb04dc773adf97c323ba36f73a5bbc0cf187306cd40d81947d74a0934c5d5b921ff0de0b73a875ad9128bb35c9f8ad57fefca6a7cb7a66bce4f88354627dcd35ad864f30b9de0c57b803389070eb5a005925d84ce028c03dcf577571e5285f841b775e5dfb7d9ab514b9ced7942b8133c0bbcd2930e3f7fc2495f2f5fb5c7621e797236b5bad5b3cb6c075236440201568416b133aa6237f31257ead178e986228e57e3900173357b938a262867f4282312897626e56ce298b61c26897ca477abcc32a551f4c911271a6e3deccdd8a8c9c63894d4402203da888a085a9924f5b0ed9d196e7d74feac421f2625285e9bf343e47936257a1ad5ad6fda810c18b4df05a4e2ee63fa0fa1a7d61779a6541ad00dceba70f3e7ffff0d0b06284c758907e282f01e42193dab83048f2860314208837732097e28405b8e75e82b3f66cf0d6b8945571239589cb3608748645586b190dc78983ab9b3e3a48c8a48ce1f46f35bb9b0e05361a062f2407a08c00b871ae538bbd21ab3f7062df3972e532562541470123105dac77663d07b42c3515d"], 0x1, 0x3, 0x0) msgctl$IPC_SET(r0, 0x1, 0xfffffffffffffffe) msgsnd(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000000000000000e27eb7ba166bb505b358b8b724a1087b37064194c070237d7fcb5d201dafb80c7acb30d7100108000000a67815dd92248a9cf21b5aa400d13522440a0f8c12ed16e9471e30fa4780be4a5ec45a3be586b8d8523564dccd2b74835e0189b9c15826abf1aed96b8ffb9870462e796c9fb64b359f7d8cd8a7e75e2fdad2c6dd7b9ce23b8581bd8809166adefcc12c77ea83a7ab4383c61355bee7033c5e008c7987c0544e3f232c0124d14cc10fe25c7881c596bea37d4b6fc651b32d7ef7c433905cdd8c2b3a54be7cdf713764c67ef76578ba2c43e1f100"/235], 0xeb, 0x800) socket(0x18, 0x400000001002, 0x0) 14:40:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000"], 0x1}}, 0x0) 14:40:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000740)="81838ea59a01f3def2", 0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:03 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0xc003, 0x0) connect$unix(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8202adfdffffffffffff3f7b238bf468d20d8a0a197a386207000000008295955984c87910bf093f68c11700287ead4bcb775ca69dfceac2a84e6abca64896819f507d0000000000002951b15801360bcd4c0a162b58fd4237b8fa4d012ae447473c220495aaee48c02f6ac41e6bf3bf554799000000ed52beb85a85f8b2fd57d60f13ad30505e8f5300a4aeef9d612f871f4385f04157795ea4a5c5fe659fa202361cd8cac7ecbc5b65c6593d2870b41200003500000000d28418ac1b00000000029cc4ac3908ddba44fb4b75550000000000000000000000df28d208000000000000006b47b8d7da4333ac0f994166518bed2e1977bd035f5ea1b1009e5a319d54401cb92f77420eea4173d5b6913eef9e8b0fb636710000d2df0ac87e0d7b65b7240cf97d03126da536ef612e9e3b79f7424082bec304ee9a498252abb7cc8e0cd938965d10374c4fea0ee6f28c35bb0edb267ae65c7d44a95bac417e2ab04fd8a9c98e958ff55d090000000000000036d11b2434c929b34b0087cf25dd9e1e49f931a4193897b0a30000cbf637786819bf7e26863a111574bd1b6d85eac8a829bf8aa02ae50c88910a9f37f502de8d7ff9f49d884ee2cf3725b1a0581adf2ea95d000000000000f145c4e68bfa8bfccf6a2c9ce08a146ee556cff99645d300682b4e970f01b899f51da0ff8237ed6b5ad30d7b696378a27e42cfc93123b8284e6b47e3f7dc2a8bcc719fe6682881ea2fd58ed735230fb7146a26ab3d3f3708e2029d36d56bf5f227030446137813494ae280cccf9136"], 0x10) dup2(r1, r0) r2 = dup(r0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 14:40:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x5f0b}, 0x0) 14:40:04 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6a8bc9634e19769bbd73"], 0x10) 14:40:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000"], 0x1}}, 0x0) 14:40:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:04 executing program 2: poll(0x0, 0x0, 0x33b) 14:40:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socket(0x1, 0x0, 0x0) r1 = socket(0x2, 0x2, 0x0) connect$unix(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x10) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = dup(r0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, &(0x7f0000000200)) sendto$inet6(r2, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) 14:40:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df000000000000000000"], 0x1}}, 0x0) 14:40:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xc00e}, 0x0) 14:40:04 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:40:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df000000000000000000"], 0x1}}, 0x0) 14:40:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf000}, 0x0) 14:40:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) 14:40:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df000000000000000000"], 0x1}}, 0x0) 14:40:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x34000}, 0x0) 14:40:05 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x240000006, 0x3) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 14:40:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040), 0x1c) 14:40:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:40:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df00"/126], 0x1}}, 0x0) 14:40:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x400300}, 0x0) 14:40:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/313], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) 14:40:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df00"/126], 0x1}}, 0x0) 14:40:05 executing program 2: 14:40:05 executing program 5: 14:40:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:05 executing program 1: 14:40:05 executing program 5: 14:40:05 executing program 2: 14:40:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf0ffff}, 0x0) 14:40:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df00"/126], 0x1}}, 0x0) 14:40:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:05 executing program 1: 14:40:05 executing program 2: 14:40:05 executing program 5: 14:40:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df00"/127], 0x1}}, 0x0) 14:40:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81838ea59a", 0x5, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:05 executing program 2: 14:40:05 executing program 5: 14:40:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x1000000}, 0x0) 14:40:05 executing program 1: 14:40:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df00"/127], 0x1}}, 0x0) 14:40:05 executing program 5: 14:40:05 executing program 2: 14:40:05 executing program 1: 14:40:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x2000000}, 0x0) 14:40:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df00"/127], 0x1}}, 0x0) 14:40:06 executing program 5: 14:40:06 executing program 2: 14:40:06 executing program 1: 14:40:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x3000000}, 0x0) 14:40:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:06 executing program 4: 14:40:06 executing program 5: 14:40:06 executing program 2: 14:40:06 executing program 1: 14:40:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:06 executing program 5: 14:40:06 executing program 2: 14:40:06 executing program 1: 14:40:06 executing program 4: 14:40:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x4000000}, 0x0) 14:40:06 executing program 4: 14:40:06 executing program 1: 14:40:06 executing program 5: 14:40:06 executing program 2: 14:40:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf000000}, 0x0) 14:40:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:06 executing program 4: 14:40:06 executing program 1: 14:40:06 executing program 2: 14:40:06 executing program 5: 14:40:06 executing program 4: 14:40:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x40000000}, 0x0) 14:40:06 executing program 1: 14:40:07 executing program 2: 14:40:07 executing program 5: 14:40:07 executing program 4: 14:40:07 executing program 1: 14:40:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x5f0b0000}, 0x0) 14:40:07 executing program 5: 14:40:07 executing program 2: 14:40:07 executing program 4: 14:40:07 executing program 1: 14:40:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:07 executing program 5: 14:40:07 executing program 2: 14:40:07 executing program 4: 14:40:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x9effffff}, 0x0) 14:40:07 executing program 1: 14:40:07 executing program 2: 14:40:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:07 executing program 5: 14:40:07 executing program 4: 14:40:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xc00e0000}, 0x0) 14:40:07 executing program 1: 14:40:07 executing program 2: 14:40:07 executing program 5: 14:40:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:07 executing program 5: 14:40:07 executing program 1: 14:40:07 executing program 4: 14:40:07 executing program 2: 14:40:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf0ffffff}, 0x0) 14:40:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:08 executing program 2: 14:40:08 executing program 5: 14:40:08 executing program 1: 14:40:08 executing program 4: 14:40:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xfffff000}, 0x0) 14:40:08 executing program 2: 14:40:08 executing program 5: 14:40:08 executing program 4: 14:40:08 executing program 1: 14:40:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xffffff7f}, 0x0) 14:40:08 executing program 2: 14:40:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:08 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 14:40:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) close(0xffffffffffffffff) close(0xffffffffffffffff) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0xaf02, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 14:40:08 executing program 1: 14:40:08 executing program 2: 14:40:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xffffff9e}, 0x0) 14:40:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:08 executing program 4: 14:40:08 executing program 1: 14:40:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xfffffff0}, 0x0) 14:40:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$unix(r4, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 14:40:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/313], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) 14:40:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:08 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000000)=ANY=[@ANYPTR64], 0x1}, 0x1, 0x0, 0x0, 0x4840}, 0x0) r0 = socket(0x10, 0x80002, 0xfe) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000140)="5e360f6daebb838f2639750e9e9971fd", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="a205184e9efbd46803a2e54621de65ad9b", 0x11}, {&(0x7f0000000640)="80", 0x1}], 0x2}}], 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0xa, 0x2, 0x0) r5 = semget(0x2, 0x0, 0x68) semtimedop(r5, &(0x7f0000000080)=[{0x1}, {0x1, 0x6, 0x1000}], 0x2, &(0x7f00000000c0)) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0xbd10, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa521e1d94efa6291}, [@IFLA_LINKINFO={0x20, 0x12, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x10, 0x2, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x4}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x10]}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x54}}, 0x0) 14:40:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x1c6, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100636273001c00020003000100000000000700000005000000a66449c507076eca8532de31cef74800feff0000000a00000000a2e387d63e7217590578003f91160e12e5cab38e62d26121a6d14b05d0df915a3f958c48"], 0x48}}, 0x0) 14:40:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffffff80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) write$dsp(r0, &(0x7f0000000040)="5aec487ef707f070ba5a44b23d2410e78f63ab21ce30ca76cbbf68a5ba8a9adcfb5f9349540d8af3b862452a6c5422dd0f7f113d52228fe1b9f66ae81606c7", 0x3f) timerfd_create(0x0, 0x0) getpgid(0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0xa, 0xd}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}}, 0x0) 14:40:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000040), 0x4) 14:40:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x1000000000000}, 0x0) 14:40:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3cd58ee1c9486c70bfaa1247267d558865039af316a920c7e2b2ea81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8bfb5b5a17ff386243a11b2d2c53115d3c8e09000000f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e3776675a80f4729390d8b2ce649ffd2193b8e0c7c92f01909e610855e3b8757b7d43f4e59362b7be89fe308d284093ec4139cad00a9ac353ff1062ec17ce9bf3ad22dde602b8321de68036c7f6cb00"/313], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) [ 1030.202115][ T9981] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1030.293469][ T9978] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 14:40:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040), 0x4) 14:40:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x40030000000000}, 0x0) 14:40:09 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@link_local, @broadcast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @remote, @link_local, @loopback}}}}, 0x0) 14:40:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040), 0x4) 14:40:09 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x404880, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000340), 0xfef5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x80, 0x10, 0xffffff1f, 0x70bd26, 0x0, {}, [@IFLA_LINKINFO={0x58, 0x12, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0x48, 0x2, [@gre_common_policy=[@IFLA_GRE_FWMARK={0x8, 0x14, 0xc323}, @IFLA_GRE_TTL={0x5, 0x8, 0x8}, @IFLA_GRE_LINK={0x8}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0xbf}, @IFLA_GRE_ENCAP_TYPE={0x6, 0xe, 0x2}], @gre_common_policy=[@IFLA_GRE_LINK={0x8}], @IFLA_GRE_REMOTE={0x14, 0x7, @dev}]}}}, @IFLA_MASTER={0x8}]}, 0x80}}, 0x0) 14:40:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf0ffffffffffff}, 0x0) [ 1030.791617][ T9989] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1030.809164][ T9992] bridge0: port 3(ipvlan1) entered blocking state [ 1030.817409][ T9992] bridge0: port 3(ipvlan1) entered disabled state [ 1030.972810][T10016] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 14:40:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, 0x0) 14:40:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040), 0x4) 14:40:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x100000000000000}, 0x0) 14:40:10 executing program 4: listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') preadv(0xffffffffffffffff, &(0x7f0000001240), 0x0, 0x4) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() preadv(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f00000000c0)=""/33, 0x21}], 0x1, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000001300)=""/4096) open(0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002600050fd25a80648c00040d0424fc60100003", 0x17}, {&(0x7f0000000000)="cd30f740de5a7f50883df94f192b07aebde22f52078219", 0x17}], 0x2}, 0x0) 14:40:10 executing program 5: close(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) 14:40:10 executing program 2: socket$rxrpc(0x21, 0x2, 0x0) syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getegid() r1 = syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') preadv(0xffffffffffffffff, &(0x7f0000001240), 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001300)=""/4096) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002600050fd25a80648c00040d0424", 0x12}, {&(0x7f0000000000)="cd30f740de5a7f50883df94f192b07aebde22f52078219ff7dd51f8a6a94041db4316149ecce21216d87", 0x2a}], 0x2}, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) 14:40:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, 0x0, 0x0) 14:40:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x200000000000000}, 0x0) 14:40:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x4c, 0x10, 0x43b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @bond={{0x9, 0x1, 'bond\x00'}, {0x1c, 0x2, [@IFLA_BOND_RESEND_IGMP={0x8}, @IFLA_BOND_FAIL_OVER_MAC={0x5}, @IFLA_BOND_XMIT_HASH_POLICY={0x5}]}}}]}, 0x4c}}, 0x0) 14:40:10 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000008c0)="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", 0xfc) 14:40:10 executing program 4: syz_open_dev$vcsn(0x0, 0x0, 0x98501) write$eventfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 14:40:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, 0x0, 0x0) [ 1031.608509][T10049] netlink: 'syz-executor.5': attribute type 28 has an invalid length. 14:40:10 executing program 1: unshare(0x400) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x30, 0x0, 0x2000004) 14:40:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x300000000000000}, 0x0) 14:40:10 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000001780)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x2, {0x1, @raw_data="7c8601da29ef0a0b76fb6e417e3e1258adf963d232308a9feddfc7adfecaedfe27e9e414899507f63032545ffd25b385a3f299a8f2ce0f3b529d318c7feec75b54d0b67156316ecbd7b6d5c36313434e47ef7b2588c1425aadf73a3d2a87d3ed1fa6928d0f8b01e359cf1b69bfa933c0a2dc5893f05b72b15d5fd638b993d440cdf1d75bfe88f3d5c96de19bd336081055a9fb8eded63dba89d4f14e401aa68910d3c0cb85e3918a656ffa0400d942b420ed0feb9edd20e1d3b7dd1030a637433675b809a65800"}}) [ 1031.676731][T10049] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 14:40:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r0, 0x0, 0x15, 0x0, &(0x7f00000001c0)) 14:40:10 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newlink={0x40, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @erspan={{0xb, 0x1, 'erspan\x00'}, {0x10, 0x2, [@gre_common_policy=[@IFLA_GRE_OKEY={0x8}], @gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x40}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 14:40:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000740)="81", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$sock_int(r0, 0x1, 0x12, 0x0, 0x0) 14:40:10 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0xa}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x400000000000000}, 0x0) 14:40:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000003c0)) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x7) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0}, 0x4000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x1, 0x2, {0x1, @raw_data="7c8601da29ef0a0b76fb6e417e3e1258adf963d232308a9feddfc7ad234e83a527e9e414899507f63032545ffd25b385a3f299a8f2ce0f3b529d318c7feec75b54d0b67156316ecbd7b6d5c36313434e47ef7b2588c1425aadf73a3d2a87d3ed1fa6928d0f8b01e359cf1b69bfa933c0a2dc5893f05b72b15d5fd638b993d440cdf1d75bfe88f3d5c96de19bd336081055a9fb8eded63dba89d4f14e401aa68910d3c0cb85e3918a656ffa0400d942b420ed0feb9edd20e1d3b7dd1030a637433675b809a65800"}}) 14:40:10 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22c, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001bffffff00004000632f77fbac141411e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1880425181aa5", 0x0, 0xfe, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 14:40:10 executing program 3: unshare(0x400) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) 14:40:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) flistxattr(r1, &(0x7f0000000100)=""/206, 0xce) 14:40:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf00000000000000}, 0x0) 14:40:11 executing program 2: unshare(0x400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x40045565, 0x0) 14:40:11 executing program 5: unshare(0x400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x40049409, 0x10) 14:40:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 14:40:11 executing program 3: unshare(0x400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) 14:40:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) mmap(&(0x7f0000abb000/0x1000)=nil, 0x1000, 0x0, 0x102000200032, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x3d, &(0x7f0000abaff9)={0x77359400}, 0x8) 14:40:11 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0xa}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:11 executing program 2: bind$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r2, 0x0, 0x1, "c3"}, 0x9) 14:40:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x4000000000000000}, 0x0) 14:40:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xc}]}}, &(0x7f00000000c0)=""/236, 0x26, 0xec, 0x8}, 0x20) 14:40:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r0, 0x0, 0xc, 0x0, &(0x7f00000001c0)) 14:40:11 executing program 4: unshare(0x400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556b, 0x300) 14:40:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x7) accept4(r1, 0x0, 0x0, 0x0) dup2(r0, r1) openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 14:40:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x5f0b000000000000}, 0x0) 14:40:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:11 executing program 4: unshare(0x400) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0xa}, &(0x7f0000000100)={0x0, 0x7530}) 14:40:12 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0xa}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x9effffff00000000}, 0x0) 14:40:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:12 executing program 4: syz_open_dev$vcsn(0x0, 0x0, 0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) pipe2$9p(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 1033.798940][T30270] FS-Cache: Duplicate cookie detected [ 1033.804962][T30270] FS-Cache: O-cookie c=00000000629c1854 [p=0000000067f73dbd fl=222 nc=0 na=1] [ 1033.813919][T30270] FS-Cache: O-cookie d=00000000cee3fa5b n=00000000f3e735b1 [ 1033.821160][T30270] FS-Cache: O-key=[48] '9afe665d75776f2c22b91663f06163fdb58295b45bb21824f09335787eb573fe26e6a174777df9aa997a15ba63701228' [ 1033.834275][T30270] FS-Cache: N-cookie c=00000000623faa7a [p=0000000067f73dbd fl=2 nc=0 na=1] 14:40:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xc00e000000000000}, 0x0) 14:40:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1033.842962][T30270] FS-Cache: N-cookie d=00000000cee3fa5b n=00000000940e92c0 [ 1033.851072][T30270] FS-Cache: N-key=[48] '9afe665d75776f2c22b91663f06163fdb58295b45bb21824f09335787eb573fe26e6a174777df9aa997a15ba63701228' 14:40:12 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @erspan={{0xb, 0x1, 'erspan\x00'}, {0x18, 0x2, [@gre_common_policy=[@IFLA_GRE_OKEY={0x8, 0x5, 0x6}], @gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}], @gre_common_policy=[@IFLA_GRE_ENCAP_TYPE={0x6}]]}}}]}, 0x48}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 14:40:12 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'ipvlan0\x00'}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@mcast1, @in6=@local, 0x4e22, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, r1}, {0x0, 0x7fff, 0x0, 0x101, 0x0, 0x1f}}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}}, 0x0, @in=@loopback, 0x0, 0x0, 0x1, 0x9, 0x8002, 0x6, 0x400}}, 0xe8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) gettid() clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0x4, &(0x7f0000000180), 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='veth1_to_hsr\x00', 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000001900)="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", 0x5ae}], 0x1}, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280)={0x20}, 0x4) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)) execve(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) getpid() ioctl$int_out(r0, 0x2, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x40000, 0x0) r3 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r3, 0x0, 0x0, &(0x7f0000000180)=0x4c4, 0x4) sendto$unix(r3, 0x0, 0x0, 0x8002, &(0x7f0000000040)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="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", 0x50c}], 0x1}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x10002) shutdown(r4, 0x0) 14:40:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xf0ffffff00000000}, 0x0) 14:40:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:13 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0xa}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 14:40:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:13 executing program 4: 14:40:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xffffff7f00000000}, 0x0) 14:40:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:13 executing program 4: 14:40:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xfffffffffffff000}, 0x0) 14:40:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:13 executing program 2: 14:40:13 executing program 4: 14:40:14 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0xa}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x2}, 0x0) 14:40:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:14 executing program 2: 14:40:14 executing program 4: 14:40:14 executing program 2: 14:40:14 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:14 executing program 4: 14:40:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x3}, 0x0) 14:40:14 executing program 2: [ 1035.705520][ T2686] FS-Cache: Duplicate cookie detected [ 1035.711537][ T2686] FS-Cache: O-cookie c=000000003469efd7 [p=0000000067f73dbd fl=222 nc=0 na=1] [ 1035.720776][ T2686] FS-Cache: O-cookie d=00000000cee3fa5b n=000000002b9a83cc [ 1035.728081][ T2686] FS-Cache: O-key=[48] '9afe665d75776f2c22b91663f06163fdb58295b45bb21824f09335787eb573fe26e6a174777df9aa997a15ba63701228' [ 1035.741154][ T2686] FS-Cache: N-cookie c=00000000b337af7d [p=0000000067f73dbd fl=2 nc=0 na=1] [ 1035.749901][ T2686] FS-Cache: N-cookie d=00000000cee3fa5b n=000000008617cb04 [ 1035.757242][ T2686] FS-Cache: N-key=[48] '9afe665d75776f2c22b91663f06163fdb58295b45bb21824f09335787eb573fe26e6a174777df9aa997a15ba63701228' 14:40:15 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0xa}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x4}, 0x0) 14:40:15 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:15 executing program 2: 14:40:15 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:15 executing program 4: 14:40:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf}, 0x0) 14:40:15 executing program 2: 14:40:15 executing program 4: 14:40:15 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:15 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:15 executing program 2: 14:40:16 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0xa}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:16 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:16 executing program 4: 14:40:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf0}, 0x0) 14:40:16 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:16 executing program 2: 14:40:16 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:16 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:16 executing program 2: 14:40:16 executing program 4: 14:40:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x300}, 0x0) 14:40:16 executing program 2: 14:40:16 executing program 1: socket$inet6(0xa, 0x5, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:16 executing program 4: 14:40:16 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:16 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xb5f}, 0x0) 14:40:16 executing program 2: 14:40:16 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:17 executing program 4: 14:40:17 executing program 2: 14:40:17 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xec0}, 0x0) 14:40:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:17 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:17 executing program 2: 14:40:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c10300000300000010050000000000000000000000000000480200004802000040040000400400004004000040040000400400000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000200248020000000000000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000026873723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ddffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000040000000000000000000000005000000090000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000028005443504d535300000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8010000000000000000000000000000000000000000000000002800697076366865616465720000000000000000000000000000000000000000000000000000000028015345434d41524b00000000000000000000000000000000000000000000000000000000000080756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e6331303233000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000092ce95f356e5ce490ba2235a857e9e701b23d73cecaa35b442536ba40ac524a26f4990c3efdc75b68a52b58c0421e4f7a888fab1e10e"], 0x1) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)}], 0x1, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x30, 0x10}, 0x0) 14:40:17 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf00}, 0x0) [ 1038.542087][T10340] kAFS: Bad value for 'source' 14:40:17 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:17 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x4000}, 0x0) [ 1038.620215][T10351] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1038.641938][T10353] xt_TCPMSS: Only works on TCP SYN packets 14:40:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) setreuid(0x0, 0x0) socket(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbc, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f00000015c0), 0x10000005c) 14:40:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x5f0b}, 0x0) [ 1038.769514][T10358] kAFS: Bad value for 'source' [ 1038.783177][T10365] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1038.801346][T10366] kAFS: Bad value for 'source' 14:40:17 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1038.951088][T10375] kAFS: Bad value for 'source' [ 1038.958805][T10377] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. 14:40:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c10300000300000010050000000000000000000000000000480200004802000040040000400400004004000040040000400400000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000200248020000000000000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000026873723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ddffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000040000000000000000000000005000000090000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000028005443504d535300000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8010000000000000000000000000000000000000000000000002800697076366865616465720000000000000000000000000000000000000000000000000000000028015345434d41524b00000000000000000000000000000000000000000000000000000000000080756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e6331303233000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000092ce95f3"], 0x1) 14:40:17 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:17 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xc00e}, 0x0) 14:40:17 executing program 1: socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) [ 1039.198730][T10388] kAFS: Bad value for 'source' [ 1039.210142][T10389] kAFS: Bad value for 'source' 14:40:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf000}, 0x0) 14:40:18 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1039.405825][T10393] xt_TCPMSS: Only works on TCP SYN packets [ 1039.425384][T10403] kAFS: Bad value for 'source' 14:40:18 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:18 executing program 1: socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x34000}, 0x0) 14:40:18 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:18 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_create(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c10300000300000010050000000000000000000000000000480200004802000040040000400400004004000040040000400400000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000200248020000000000000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000026873723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ddffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000040000000000000000000000005000000090000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000028005443504d535300000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8010000000000000000000000000000000000000000000000002800697076366865616465720000000000000000000000000000000000000000000000000000000028015345434d41524b00000000000000000000000000000000000000000000000000000000000080756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e6331303233000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000092ce95f356e5ce490ba2235a857e9e701b23d73cecaa35b442536ba40ac524a26f4990c3efdc75b68a52b58c0421e4f7a888fab1e10e779b15d3e850b51eee9c2c1b193647659458db68a2dc5732a842b870aefae232a9a61eecf2d0f86363584e82f2e56e9261eaaf5491c58ce1d6"], 0x1) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="28772d1abfd1e4e39ff9eb872eedb87f10cc0a99a0a49835d894888cae62bae77858577c0720ac473cd1ecf5381ba98c0461c3eece25598ae50a2018b1a689ef8e990f219810f4b88829cad8d30ea7939390227aed72b169db525d040159068660e2b26e7a4641be3c7f5ab2ff8b685524ef4ebe7a79538769ab", 0x7a}], 0x1, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x60, 0x10}, 0x0) [ 1039.656746][T10410] kAFS: Bad value for 'source' [ 1039.681320][T10413] kAFS: Bad value for 'source' 14:40:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c10300000300000010050000000000000000000000000000480200004802000040040000400400004004000040040000400400000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000200248020000000000000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000026873723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ddffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000040000000000000000000000005000000090000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000028005443504d535300000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8010000000000000000000000000000000000000000000000002800697076366865616465720000000000000000000000000000000000000000000000000000000028015345434d41524b00000000000000000000000000000000000000000000000000000000000080756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e6331303233000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000092ce95f3"], 0x1) 14:40:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x400300}, 0x0) 14:40:18 executing program 1: socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:18 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:18 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1039.868585][T10399] xt_TCPMSS: Only works on TCP SYN packets [ 1039.910226][T10425] xt_TCPMSS: Only works on TCP SYN packets 14:40:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, 0x0, 0x0) 14:40:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf0ffff}, 0x0) [ 1039.950747][T10432] kAFS: Bad value for 'source' [ 1039.959274][T10431] kAFS: Bad value for 'source' 14:40:18 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:18 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1040.118492][T10435] xt_TCPMSS: Only works on TCP SYN packets [ 1040.129212][T10444] kAFS: Bad value for 'source' 14:40:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, 0x0, 0x0) 14:40:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x1000000}, 0x0) 14:40:19 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:19 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:19 executing program 2: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_cipso(0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) 14:40:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, 0x0, 0x0) 14:40:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x2000000}, 0x0) 14:40:19 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:19 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0), 0x0) 14:40:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x3000000}, 0x0) 14:40:19 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0), 0x0) 14:40:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:19 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x4000000}, 0x0) 14:40:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0xffffff9e}, 0x0) 14:40:20 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0), 0x0) 14:40:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf000000}, 0x0) 14:40:20 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) 14:40:20 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x40000000}, 0x0) 14:40:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:40:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) 14:40:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x5f0b0000}, 0x0) 14:40:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) 14:40:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x9effffff}, 0x0) 14:40:20 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:21 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)}], 0x1) 14:40:21 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xc00e0000}, 0x0) 14:40:21 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)}], 0x1) 14:40:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf0ffffff}, 0x0) 14:40:21 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:21 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)}], 0x1) 14:40:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xfffff000}, 0x0) 14:40:21 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f", 0x24}], 0x1) 14:40:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xffffff7f}, 0x0) 14:40:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f", 0x24}], 0x1) 14:40:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:22 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xffffff9e}, 0x0) 14:40:22 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f", 0x24}], 0x1) 14:40:22 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e39218", 0x36}], 0x1) 14:40:22 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xfffffff0}, 0x0) 14:40:22 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1044.080911][T10659] kAFS: Bad value for 'source' 14:40:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e39218", 0x36}], 0x1) 14:40:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x1000000000000}, 0x0) 14:40:23 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:23 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1044.391511][T10666] kAFS: Bad value for 'source' 14:40:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e39218", 0x36}], 0x1) 14:40:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x40030000000000}, 0x0) 14:40:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:23 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1044.666214][T10686] kAFS: Bad value for 'source' 14:40:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb00000003", 0x3f}], 0x1) 14:40:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 14:40:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:23 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1045.083185][T10697] kAFS: Bad value for 'source' 14:40:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb00000003", 0x3f}], 0x1) 14:40:23 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:23 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x100000000000000}, 0x0) 14:40:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1045.295933][T10715] kAFS: Bad value for 'source' 14:40:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb00000003", 0x3f}], 0x1) 14:40:24 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x200000000000000}, 0x0) 14:40:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x300000000000000}, 0x0) [ 1045.805780][T10732] kAFS: Bad value for 'source' 14:40:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff", 0x44}], 0x1) 14:40:24 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:24 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x400000000000000}, 0x0) 14:40:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) 14:40:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff", 0x44}], 0x1) 14:40:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf00000000000000}, 0x0) 14:40:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0xffffffffffffffff, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff", 0x44}], 0x1) 14:40:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x4000000000000000}, 0x0) 14:40:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x5f0b000000000000}, 0x0) 14:40:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7", 0x46}], 0x1) 14:40:25 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) 14:40:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 14:40:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7", 0x46}], 0x1) 14:40:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:26 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0xffffffffffffffff, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xc00e000000000000}, 0x0) 14:40:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7", 0x46}], 0x1) 14:40:26 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 14:40:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5", 0x47}], 0x1) 14:40:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 14:40:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) 14:40:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5", 0x47}], 0x1) 14:40:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5", 0x47}], 0x1) 14:40:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r2, 0x4) ptrace(0xffffffffffffffff, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:27 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 14:40:27 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) 14:40:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 14:40:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 14:40:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:28 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x3}, 0x0) 14:40:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:29 executing program 1 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:29 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 1050.346605][T10890] FAULT_INJECTION: forcing a failure. [ 1050.346605][T10890] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.353205][T10891] FAULT_INJECTION: forcing a failure. [ 1050.353205][T10891] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.407980][T10890] CPU: 0 PID: 10890 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 1050.416936][T10890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.427028][T10890] Call Trace: [ 1050.430346][T10890] dump_stack+0x197/0x210 [ 1050.434713][T10890] should_fail.cold+0xa/0x15 [ 1050.439720][T10890] ? release_sock+0x156/0x1c0 [ 1050.444535][T10890] ? fault_create_debugfs_attr+0x180/0x180 [ 1050.450641][T10890] ? ___might_sleep+0x163/0x2c0 [ 1050.455537][T10890] __should_failslab+0x121/0x190 [ 1050.460536][T10890] should_failslab+0x9/0x14 [ 1050.465243][T10890] kmem_cache_alloc_node+0x268/0x740 [ 1050.470587][T10890] __alloc_skb+0xd5/0x5e0 [ 1050.474946][T10890] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1050.480539][T10890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1050.486822][T10890] ? netlink_autobind.isra.0+0x223/0x300 [ 1050.493375][T10890] netlink_sendmsg+0xa1b/0xea0 [ 1050.498294][T10890] ? netlink_unicast+0x7d0/0x7d0 [ 1050.503443][T10890] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1050.509044][T10890] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1050.514526][T10890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1050.522347][T10890] ? security_socket_sendmsg+0x8d/0xc0 [ 1050.528299][T10890] ? netlink_unicast+0x7d0/0x7d0 [ 1050.533348][T10890] sock_sendmsg+0xd7/0x130 [ 1050.537846][T10890] sock_write_iter+0x2cb/0x400 [ 1050.542730][T10890] ? sock_sendmsg+0x130/0x130 [ 1050.547531][T10890] ? common_file_perm+0x2f3/0x940 [ 1050.552707][T10890] do_iter_readv_writev+0x5f8/0x8f0 [ 1050.558032][T10890] ? no_seek_end_llseek_size+0x70/0x70 [ 1050.563519][T10890] ? apparmor_file_permission+0x27/0x30 [ 1050.569095][T10890] ? rw_verify_area+0x126/0x360 [ 1050.574059][T10890] do_iter_write+0x184/0x610 [ 1050.578777][T10890] ? dup_iter+0x260/0x260 [ 1050.583746][T10890] vfs_writev+0x1b3/0x2f0 [ 1050.588103][T10890] ? vfs_iter_write+0xb0/0xb0 [ 1050.593048][T10890] ? __kasan_check_read+0x11/0x20 [ 1050.598220][T10890] ? ksys_dup3+0x3e0/0x3e0 [ 1050.602773][T10890] ? wait_for_completion+0x440/0x440 [ 1050.608610][T10890] ? __fget_light+0x1a9/0x230 [ 1050.613454][T10890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1050.620047][T10890] do_writev+0x2b0/0x330 [ 1050.624353][T10890] ? ksys_write+0x1cf/0x290 [ 1050.629941][T10890] ? vfs_writev+0x2f0/0x2f0 [ 1050.634695][T10890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1050.640463][T10890] ? do_syscall_64+0x26/0x790 [ 1050.645249][T10890] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.651804][T10890] ? do_syscall_64+0x26/0x790 [ 1050.656830][T10890] __x64_sys_writev+0x75/0xb0 [ 1050.661987][T10890] do_syscall_64+0xfa/0x790 [ 1050.666707][T10890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.672878][T10890] RIP: 0033:0x45b349 [ 1050.676786][T10890] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1050.696852][T10890] RSP: 002b:00007f2f0112bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 14:40:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf}, 0x0) 14:40:29 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1050.705287][T10890] RAX: ffffffffffffffda RBX: 00007f2f0112c6d4 RCX: 000000000045b349 [ 1050.713487][T10890] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1050.721768][T10890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1050.730306][T10890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1050.738382][T10890] R13: 0000000000000caf R14: 00000000004c9a6b R15: 0000000000000000 [ 1050.757754][T10891] CPU: 1 PID: 10891 Comm: syz-executor.1 Not tainted 5.5.0-rc7-syzkaller #0 [ 1050.766520][T10891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.776800][T10891] Call Trace: [ 1050.780122][T10891] dump_stack+0x197/0x210 [ 1050.784466][T10891] should_fail.cold+0xa/0x15 [ 1050.789060][T10891] ? fault_create_debugfs_attr+0x180/0x180 [ 1050.794962][T10891] ? ___might_sleep+0x163/0x2c0 [ 1050.799994][T10891] __should_failslab+0x121/0x190 [ 1050.805404][T10891] should_failslab+0x9/0x14 [ 1050.810081][T10891] __kmalloc_track_caller+0x2dc/0x760 [ 1050.815833][T10891] ? fput+0x1b/0x20 [ 1050.819654][T10891] ? ksys_write+0x1cf/0x290 [ 1050.824208][T10891] ? strndup_user+0x77/0xd0 [ 1050.828916][T10891] memdup_user+0x26/0xd0 [ 1050.833605][T10891] strndup_user+0x77/0xd0 [ 1050.838049][T10891] __x64_sys_mount+0xe9/0x230 [ 1050.842755][T10891] do_syscall_64+0xfa/0x790 [ 1050.847364][T10891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.853246][T10891] RIP: 0033:0x45b349 [ 1050.857160][T10891] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1050.876951][T10891] RSP: 002b:00007f3906a8bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1050.885373][T10891] RAX: ffffffffffffffda RBX: 00007f3906a8c6d4 RCX: 000000000045b349 [ 1050.893442][T10891] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1050.901609][T10891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1050.909586][T10891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1050.917654][T10891] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000000 14:40:29 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) [ 1051.174634][T10905] FAULT_INJECTION: forcing a failure. [ 1051.174634][T10905] name failslab, interval 1, probability 0, space 0, times 0 [ 1051.233100][T10905] CPU: 1 PID: 10905 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 1051.242092][T10905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.252157][T10905] Call Trace: [ 1051.255464][T10905] dump_stack+0x197/0x210 [ 1051.259818][T10905] should_fail.cold+0xa/0x15 [ 1051.264459][T10905] ? fault_create_debugfs_attr+0x180/0x180 [ 1051.270296][T10905] ? ___might_sleep+0x163/0x2c0 [ 1051.275171][T10905] __should_failslab+0x121/0x190 [ 1051.280136][T10905] should_failslab+0x9/0x14 [ 1051.284667][T10905] kmem_cache_alloc_node_trace+0x274/0x750 [ 1051.290627][T10905] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1051.296631][T10905] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1051.302463][T10905] __kmalloc_node_track_caller+0x3d/0x70 [ 1051.308118][T10905] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1051.313515][T10905] __alloc_skb+0x10b/0x5e0 [ 1051.318055][T10905] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1051.323711][T10905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:40:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 14:40:30 executing program 1 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1051.329983][T10905] ? netlink_autobind.isra.0+0x223/0x300 [ 1051.335639][T10905] netlink_sendmsg+0xa1b/0xea0 [ 1051.340454][T10905] ? netlink_unicast+0x7d0/0x7d0 [ 1051.345401][T10905] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1051.350973][T10905] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1051.356468][T10905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1051.364427][T10905] ? security_socket_sendmsg+0x8d/0xc0 [ 1051.369905][T10905] ? netlink_unicast+0x7d0/0x7d0 [ 1051.375544][T10905] sock_sendmsg+0xd7/0x130 [ 1051.380069][T10905] sock_write_iter+0x2cb/0x400 [ 1051.384852][T10905] ? sock_sendmsg+0x130/0x130 [ 1051.389791][T10905] ? common_file_perm+0x2f3/0x940 [ 1051.394906][T10905] do_iter_readv_writev+0x5f8/0x8f0 [ 1051.400141][T10905] ? no_seek_end_llseek_size+0x70/0x70 [ 1051.405620][T10905] ? apparmor_file_permission+0x27/0x30 [ 1051.411192][T10905] ? rw_verify_area+0x126/0x360 [ 1051.416149][T10905] do_iter_write+0x184/0x610 [ 1051.420381][T10913] FAULT_INJECTION: forcing a failure. [ 1051.420381][T10913] name failslab, interval 1, probability 0, space 0, times 0 [ 1051.420764][T10905] ? dup_iter+0x260/0x260 [ 1051.437889][T10905] vfs_writev+0x1b3/0x2f0 [ 1051.442239][T10905] ? vfs_iter_write+0xb0/0xb0 [ 1051.447053][T10905] ? __kasan_check_read+0x11/0x20 [ 1051.452113][T10905] ? ksys_dup3+0x3e0/0x3e0 [ 1051.456563][T10905] ? wait_for_completion+0x440/0x440 [ 1051.461876][T10905] ? __fget_light+0x1a9/0x230 [ 1051.467596][T10905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1051.473861][T10905] do_writev+0x2b0/0x330 [ 1051.478123][T10905] ? ksys_write+0x1cf/0x290 14:40:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1051.482648][T10905] ? vfs_writev+0x2f0/0x2f0 [ 1051.487289][T10905] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1051.493038][T10905] ? do_syscall_64+0x26/0x790 [ 1051.497740][T10905] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.503915][T10905] ? do_syscall_64+0x26/0x790 [ 1051.508637][T10905] __x64_sys_writev+0x75/0xb0 [ 1051.513375][T10905] do_syscall_64+0xfa/0x790 [ 1051.517916][T10905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.523815][T10905] RIP: 0033:0x45b349 [ 1051.527825][T10905] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1051.547443][T10905] RSP: 002b:00007f2f0112bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1051.556017][T10905] RAX: ffffffffffffffda RBX: 00007f2f0112c6d4 RCX: 000000000045b349 [ 1051.564186][T10905] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1051.572907][T10905] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1051.581281][T10905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1051.589363][T10905] R13: 0000000000000caf R14: 00000000004c9a6b R15: 0000000000000001 [ 1051.615767][T10913] CPU: 0 PID: 10913 Comm: syz-executor.1 Not tainted 5.5.0-rc7-syzkaller #0 [ 1051.624579][T10913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:40:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 1051.634735][T10913] Call Trace: [ 1051.638320][T10913] dump_stack+0x197/0x210 [ 1051.642767][T10913] should_fail.cold+0xa/0x15 [ 1051.647406][T10913] ? fault_create_debugfs_attr+0x180/0x180 [ 1051.653238][T10913] ? ___might_sleep+0x163/0x2c0 [ 1051.658234][T10913] __should_failslab+0x121/0x190 [ 1051.663194][T10913] should_failslab+0x9/0x14 [ 1051.667717][T10913] __kmalloc_track_caller+0x2dc/0x760 [ 1051.673103][T10913] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1051.679357][T10913] ? strndup_user+0x77/0xd0 [ 1051.683882][T10913] memdup_user+0x26/0xd0 [ 1051.688134][T10913] strndup_user+0x77/0xd0 [ 1051.692577][T10913] __x64_sys_mount+0x132/0x230 [ 1051.697364][T10913] do_syscall_64+0xfa/0x790 [ 1051.701889][T10913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.707796][T10913] RIP: 0033:0x45b349 [ 1051.711803][T10913] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:40:30 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1051.731626][T10913] RSP: 002b:00007f3906a8bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1051.740068][T10913] RAX: ffffffffffffffda RBX: 00007f3906a8c6d4 RCX: 000000000045b349 [ 1051.748437][T10913] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1051.756515][T10913] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1051.764505][T10913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1051.772585][T10913] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000001 14:40:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xb5f}, 0x0) [ 1051.884297][T10930] FAULT_INJECTION: forcing a failure. [ 1051.884297][T10930] name failslab, interval 1, probability 0, space 0, times 0 14:40:30 executing program 1 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1051.957243][T10930] CPU: 0 PID: 10930 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 1051.966217][T10930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.976284][T10930] Call Trace: [ 1051.979615][T10930] dump_stack+0x197/0x210 [ 1051.983978][T10930] should_fail.cold+0xa/0x15 [ 1051.988743][T10930] ? fault_create_debugfs_attr+0x180/0x180 [ 1051.994597][T10930] ? ___might_sleep+0x163/0x2c0 [ 1051.999475][T10930] __should_failslab+0x121/0x190 [ 1052.005138][T10930] should_failslab+0x9/0x14 [ 1052.009753][T10930] kmem_cache_alloc_node+0x268/0x740 [ 1052.015058][T10930] ? mutex_trylock+0x2d0/0x2d0 [ 1052.019849][T10930] ? __netlink_dump_start+0x662/0x930 [ 1052.025251][T10930] __alloc_skb+0xd5/0x5e0 [ 1052.029616][T10930] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1052.035181][T10930] ? lock_downgrade+0x920/0x920 [ 1052.040053][T10930] netlink_dump+0x71f/0xfb0 [ 1052.044582][T10930] ? __netlink_sendskb+0xc0/0xc0 [ 1052.049555][T10930] __netlink_dump_start+0x66a/0x930 [ 1052.054864][T10930] inet_diag_handler_cmd+0x262/0x320 [ 1052.060166][T10930] ? inet_diag_rcv_msg_compat+0x350/0x350 [ 1052.065909][T10930] ? sock_diag_rcv+0x1c/0x40 [ 1052.070606][T10930] ? inet_diag_dump_compat+0x320/0x320 [ 1052.076121][T10930] sock_diag_rcv_msg+0x319/0x410 [ 1052.081079][T10930] netlink_rcv_skb+0x177/0x450 [ 1052.086008][T10930] ? sock_diag_bind+0x80/0x80 [ 1052.090711][T10930] ? netlink_ack+0xb50/0xb50 [ 1052.095336][T10930] ? __kasan_check_read+0x11/0x20 [ 1052.100483][T10930] sock_diag_rcv+0x2b/0x40 [ 1052.104910][T10930] netlink_unicast+0x58c/0x7d0 [ 1052.109878][T10930] ? netlink_attachskb+0x870/0x870 [ 1052.115191][T10930] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1052.120927][T10930] ? __check_object_size+0x3d/0x437 [ 1052.126260][T10930] netlink_sendmsg+0x91c/0xea0 [ 1052.131044][T10930] ? netlink_unicast+0x7d0/0x7d0 [ 1052.136172][T10930] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1052.141763][T10930] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1052.147302][T10930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.153569][T10930] ? security_socket_sendmsg+0x8d/0xc0 [ 1052.159060][T10930] ? netlink_unicast+0x7d0/0x7d0 [ 1052.164108][T10930] sock_sendmsg+0xd7/0x130 [ 1052.168552][T10930] sock_write_iter+0x2cb/0x400 [ 1052.173416][T10930] ? sock_sendmsg+0x130/0x130 [ 1052.178111][T10930] ? common_file_perm+0x2f3/0x940 [ 1052.183166][T10930] do_iter_readv_writev+0x5f8/0x8f0 [ 1052.188396][T10930] ? no_seek_end_llseek_size+0x70/0x70 [ 1052.193872][T10930] ? apparmor_file_permission+0x27/0x30 [ 1052.199443][T10930] ? rw_verify_area+0x126/0x360 [ 1052.204318][T10930] do_iter_write+0x184/0x610 [ 1052.208927][T10930] ? dup_iter+0x260/0x260 [ 1052.224170][T10930] vfs_writev+0x1b3/0x2f0 [ 1052.228512][T10930] ? vfs_iter_write+0xb0/0xb0 [ 1052.233201][T10930] ? __kasan_check_read+0x11/0x20 [ 1052.238262][T10930] ? ksys_dup3+0x3e0/0x3e0 [ 1052.242805][T10930] ? wait_for_completion+0x440/0x440 [ 1052.248120][T10930] ? __fget_light+0x1a9/0x230 [ 1052.253278][T10930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.259543][T10930] do_writev+0x2b0/0x330 [ 1052.263981][T10930] ? ksys_write+0x1cf/0x290 [ 1052.268515][T10930] ? vfs_writev+0x2f0/0x2f0 [ 1052.273127][T10930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1052.278639][T10930] ? do_syscall_64+0x26/0x790 [ 1052.283997][T10930] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1052.290271][T10930] ? do_syscall_64+0x26/0x790 [ 1052.294966][T10930] __x64_sys_writev+0x75/0xb0 [ 1052.299670][T10930] do_syscall_64+0xfa/0x790 [ 1052.304361][T10930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1052.310277][T10930] RIP: 0033:0x45b349 [ 1052.314197][T10930] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1052.333901][T10930] RSP: 002b:00007f2f0112bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1052.342337][T10930] RAX: ffffffffffffffda RBX: 00007f2f0112c6d4 RCX: 000000000045b349 [ 1052.350363][T10930] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1052.358352][T10930] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1052.366628][T10930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1052.374620][T10930] R13: 0000000000000caf R14: 00000000004c9a6b R15: 0000000000000002 [ 1052.403224][T10939] FAULT_INJECTION: forcing a failure. [ 1052.403224][T10939] name failslab, interval 1, probability 0, space 0, times 0 [ 1052.440849][T10939] CPU: 0 PID: 10939 Comm: syz-executor.1 Not tainted 5.5.0-rc7-syzkaller #0 [ 1052.449569][T10939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.460603][T10939] Call Trace: [ 1052.463951][T10939] dump_stack+0x197/0x210 [ 1052.468306][T10939] should_fail.cold+0xa/0x15 [ 1052.473017][T10939] ? fault_create_debugfs_attr+0x180/0x180 [ 1052.478942][T10939] ? ___might_sleep+0x163/0x2c0 [ 1052.483827][T10939] __should_failslab+0x121/0x190 [ 1052.488784][T10939] should_failslab+0x9/0x14 [ 1052.493308][T10939] kmem_cache_alloc+0x2aa/0x710 [ 1052.498227][T10939] ? __might_fault+0x12b/0x1e0 [ 1052.503395][T10939] ? find_held_lock+0x35/0x130 [ 1052.508194][T10939] getname_flags+0xd6/0x5b0 [ 1052.512798][T10939] user_path_at_empty+0x2f/0x50 [ 1052.517787][T10939] do_mount+0x150/0x1b50 [ 1052.522059][T10939] ? copy_mount_string+0x40/0x40 [ 1052.527109][T10939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1052.533380][T10939] ? _copy_from_user+0x12c/0x1a0 [ 1052.538370][T10939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1052.544641][T10939] ? copy_mount_options+0x2e8/0x3f0 14:40:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xec0}, 0x0) [ 1052.549872][T10939] __x64_sys_mount+0x192/0x230 [ 1052.554667][T10939] do_syscall_64+0xfa/0x790 [ 1052.559204][T10939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1052.565546][T10939] RIP: 0033:0x45b349 [ 1052.569453][T10939] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1052.589336][T10939] RSP: 002b:00007f3906a8bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 14:40:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x4) ptrace(0x8, r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) [ 1052.597873][T10939] RAX: ffffffffffffffda RBX: 00007f3906a8c6d4 RCX: 000000000045b349 [ 1052.605862][T10939] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1052.613938][T10939] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1052.622070][T10939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1052.630070][T10939] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000002 14:40:31 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 14:40:31 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:31 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:31 executing program 1 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5f0b}, 0x0) [ 1053.159632][T10966] FAULT_INJECTION: forcing a failure. [ 1053.159632][T10966] name failslab, interval 1, probability 0, space 0, times 0 [ 1053.244738][T10966] CPU: 1 PID: 10966 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 1053.253462][T10966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1053.263828][T10966] Call Trace: [ 1053.267241][T10966] dump_stack+0x197/0x210 [ 1053.271619][T10966] should_fail.cold+0xa/0x15 [ 1053.276238][T10966] ? fault_create_debugfs_attr+0x180/0x180 [ 1053.282074][T10966] ? ___might_sleep+0x163/0x2c0 [ 1053.286950][T10966] __should_failslab+0x121/0x190 [ 1053.291916][T10966] should_failslab+0x9/0x14 [ 1053.296445][T10966] kmem_cache_alloc_node_trace+0x274/0x750 [ 1053.302273][T10966] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1053.308276][T10966] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1053.314111][T10966] __kmalloc_node_track_caller+0x3d/0x70 [ 1053.319878][T10966] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1053.325463][T10966] __alloc_skb+0x10b/0x5e0 [ 1053.329894][T10966] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1053.335445][T10966] ? lock_downgrade+0x920/0x920 [ 1053.340316][T10966] netlink_dump+0x71f/0xfb0 [ 1053.344849][T10966] ? __netlink_sendskb+0xc0/0xc0 [ 1053.349809][T10966] __netlink_dump_start+0x66a/0x930 [ 1053.355124][T10966] inet_diag_handler_cmd+0x262/0x320 [ 1053.360420][T10966] ? inet_diag_rcv_msg_compat+0x350/0x350 [ 1053.366156][T10966] ? sock_diag_rcv+0x1c/0x40 [ 1053.370782][T10966] ? inet_diag_dump_compat+0x320/0x320 [ 1053.376291][T10966] sock_diag_rcv_msg+0x319/0x410 [ 1053.381275][T10966] netlink_rcv_skb+0x177/0x450 [ 1053.386147][T10966] ? sock_diag_bind+0x80/0x80 [ 1053.390924][T10966] ? netlink_ack+0xb50/0xb50 [ 1053.395523][T10966] ? __kasan_check_read+0x11/0x20 [ 1053.400577][T10966] sock_diag_rcv+0x2b/0x40 [ 1053.405006][T10966] netlink_unicast+0x58c/0x7d0 [ 1053.409808][T10966] ? netlink_attachskb+0x870/0x870 [ 1053.414929][T10966] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1053.420660][T10966] ? __check_object_size+0x3d/0x437 [ 1053.425887][T10966] netlink_sendmsg+0x91c/0xea0 [ 1053.430662][T10966] ? netlink_unicast+0x7d0/0x7d0 [ 1053.435615][T10966] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1053.441174][T10966] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1053.446641][T10966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.452885][T10966] ? security_socket_sendmsg+0x8d/0xc0 [ 1053.458363][T10966] ? netlink_unicast+0x7d0/0x7d0 [ 1053.463304][T10966] sock_sendmsg+0xd7/0x130 [ 1053.468430][T10966] sock_write_iter+0x2cb/0x400 [ 1053.473249][T10966] ? sock_sendmsg+0x130/0x130 [ 1053.477953][T10966] ? common_file_perm+0x2f3/0x940 [ 1053.483005][T10966] do_iter_readv_writev+0x5f8/0x8f0 [ 1053.484570][T10969] FAULT_INJECTION: forcing a failure. [ 1053.484570][T10969] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1053.488226][T10966] ? no_seek_end_llseek_size+0x70/0x70 [ 1053.506862][T10966] ? apparmor_file_permission+0x27/0x30 [ 1053.512560][T10966] ? rw_verify_area+0x126/0x360 [ 1053.517502][T10966] do_iter_write+0x184/0x610 [ 1053.522106][T10966] ? dup_iter+0x260/0x260 [ 1053.526438][T10966] vfs_writev+0x1b3/0x2f0 [ 1053.530763][T10966] ? vfs_iter_write+0xb0/0xb0 [ 1053.535428][T10966] ? __kasan_check_read+0x11/0x20 [ 1053.540452][T10966] ? ksys_dup3+0x3e0/0x3e0 [ 1053.544883][T10966] ? wait_for_completion+0x440/0x440 [ 1053.550178][T10966] ? __fget_light+0x1a9/0x230 [ 1053.554859][T10966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.561096][T10966] do_writev+0x2b0/0x330 [ 1053.566636][T10966] ? ksys_write+0x1cf/0x290 [ 1053.571132][T10966] ? vfs_writev+0x2f0/0x2f0 [ 1053.575634][T10966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1053.581134][T10966] ? do_syscall_64+0x26/0x790 [ 1053.585814][T10966] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.591968][T10966] ? do_syscall_64+0x26/0x790 [ 1053.596644][T10966] __x64_sys_writev+0x75/0xb0 [ 1053.601330][T10966] do_syscall_64+0xfa/0x790 [ 1053.605851][T10966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.611739][T10966] RIP: 0033:0x45b349 [ 1053.615655][T10966] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1053.636669][T10966] RSP: 002b:00007f2f0112bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1053.645162][T10966] RAX: ffffffffffffffda RBX: 00007f2f0112c6d4 RCX: 000000000045b349 [ 1053.653561][T10966] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1053.661692][T10966] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1053.669660][T10966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1053.677618][T10966] R13: 0000000000000caf R14: 00000000004c9a6b R15: 0000000000000003 [ 1053.685622][T10969] CPU: 0 PID: 10969 Comm: syz-executor.1 Not tainted 5.5.0-rc7-syzkaller #0 14:40:32 executing program 4 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1053.694578][T10969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1053.705165][T10969] Call Trace: [ 1053.708475][T10969] dump_stack+0x197/0x210 [ 1053.712915][T10969] should_fail.cold+0xa/0x15 [ 1053.717528][T10969] ? fault_create_debugfs_attr+0x180/0x180 [ 1053.723398][T10969] ? __kasan_check_read+0x11/0x20 [ 1053.728628][T10969] ? __lock_acquire+0x16f2/0x4a00 [ 1053.733687][T10969] should_fail_alloc_page+0x50/0x60 [ 1053.739876][T10969] __alloc_pages_nodemask+0x1a1/0x910 14:40:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) [ 1053.745280][T10969] ? fs_reclaim_release+0xf/0x30 [ 1053.750227][T10969] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1053.755964][T10969] ? fs_reclaim_release+0xf/0x30 [ 1053.760926][T10969] ? fault_create_debugfs_attr+0x180/0x180 [ 1053.766759][T10969] cache_grow_begin+0x90/0xc60 [ 1053.771552][T10969] ? getname_flags+0xd6/0x5b0 [ 1053.776250][T10969] ? trace_hardirqs_off+0x62/0x240 [ 1053.781373][T10969] kmem_cache_alloc+0x64e/0x710 [ 1053.786241][T10969] ? __might_fault+0x12b/0x1e0 [ 1053.791048][T10969] getname_flags+0xd6/0x5b0 [ 1053.795619][T10969] user_path_at_empty+0x2f/0x50 [ 1053.800503][T10969] do_mount+0x150/0x1b50 [ 1053.804766][T10969] ? copy_mount_string+0x40/0x40 [ 1053.809812][T10969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1053.816072][T10969] ? _copy_from_user+0x12c/0x1a0 [ 1053.821034][T10969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1053.827292][T10969] ? copy_mount_options+0x2e8/0x3f0 [ 1053.832508][T10969] __x64_sys_mount+0x192/0x230 [ 1053.837292][T10969] do_syscall_64+0xfa/0x790 [ 1053.841826][T10969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.847738][T10969] RIP: 0033:0x45b349 [ 1053.851654][T10969] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1053.871380][T10969] RSP: 002b:00007f3906a8bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1053.879895][T10969] RAX: ffffffffffffffda RBX: 00007f3906a8c6d4 RCX: 000000000045b349 [ 1053.887885][T10969] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1053.895867][T10969] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1053.903858][T10969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1053.911851][T10969] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000003 14:40:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf000}, 0x0) [ 1053.989657][T10980] FAULT_INJECTION: forcing a failure. [ 1053.989657][T10980] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.043558][T10980] CPU: 0 PID: 10980 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 1054.052956][T10980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1054.063226][T10980] Call Trace: [ 1054.066539][T10980] dump_stack+0x197/0x210 [ 1054.070892][T10980] should_fail.cold+0xa/0x15 [ 1054.075502][T10980] ? fault_create_debugfs_attr+0x180/0x180 [ 1054.081421][T10980] ? ___might_sleep+0x163/0x2c0 [ 1054.086296][T10980] __should_failslab+0x121/0x190 [ 1054.091347][T10980] should_failslab+0x9/0x14 [ 1054.095976][T10980] __kmalloc_track_caller+0x2dc/0x760 [ 1054.101389][T10980] ? fput+0x1b/0x20 [ 1054.105217][T10980] ? ksys_write+0x1cf/0x290 [ 1054.109740][T10980] ? strndup_user+0x77/0xd0 [ 1054.114262][T10980] memdup_user+0x26/0xd0 [ 1054.118521][T10980] strndup_user+0x77/0xd0 [ 1054.122903][T10980] __x64_sys_mount+0xe9/0x230 [ 1054.127705][T10980] do_syscall_64+0xfa/0x790 [ 1054.132509][T10980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1054.138586][T10980] RIP: 0033:0x45b349 [ 1054.142497][T10980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1054.162290][T10980] RSP: 002b:00007f3d01da3c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1054.170893][T10980] RAX: ffffffffffffffda RBX: 00007f3d01da46d4 RCX: 000000000045b349 [ 1054.179582][T10980] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1054.187660][T10980] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1054.195660][T10980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1054.204818][T10980] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000000 14:40:33 executing program 5 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 14:40:33 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:33 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 14:40:33 executing program 4 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) [ 1054.487529][T10995] FAULT_INJECTION: forcing a failure. [ 1054.487529][T10995] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.553611][T10995] CPU: 0 PID: 10995 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1054.562333][T10995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1054.572753][T10995] Call Trace: [ 1054.576075][T10995] dump_stack+0x197/0x210 [ 1054.580433][T10995] should_fail.cold+0xa/0x15 [ 1054.585049][T10995] ? fault_create_debugfs_attr+0x180/0x180 [ 1054.590878][T10995] ? ___might_sleep+0x163/0x2c0 [ 1054.595844][T10995] __should_failslab+0x121/0x190 [ 1054.600809][T10995] should_failslab+0x9/0x14 [ 1054.605363][T10995] __kmalloc_track_caller+0x2dc/0x760 [ 1054.610760][T10995] ? fput+0x1b/0x20 [ 1054.614608][T10995] ? ksys_write+0x1cf/0x290 [ 1054.619223][T10995] ? strndup_user+0x77/0xd0 [ 1054.623747][T10995] memdup_user+0x26/0xd0 [ 1054.628011][T10995] strndup_user+0x77/0xd0 [ 1054.632364][T10995] __x64_sys_mount+0xe9/0x230 [ 1054.637067][T10995] do_syscall_64+0xfa/0x790 [ 1054.641593][T10995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1054.647504][T10995] RIP: 0033:0x45b349 [ 1054.651412][T10995] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1054.671031][T10995] RSP: 002b:00007f46e199ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1054.679805][T10995] RAX: ffffffffffffffda RBX: 00007f46e199f6d4 RCX: 000000000045b349 [ 1054.687878][T10995] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1054.695891][T10995] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 14:40:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 14:40:33 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="259afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1054.703876][T10995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1054.712043][T10995] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000000 [ 1054.761225][T11004] FAULT_INJECTION: forcing a failure. [ 1054.761225][T11004] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.791423][T11004] CPU: 0 PID: 11004 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 1054.800142][T11004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1054.810385][T11004] Call Trace: [ 1054.813702][T11004] dump_stack+0x197/0x210 [ 1054.818236][T11004] should_fail.cold+0xa/0x15 [ 1054.822854][T11004] ? fault_create_debugfs_attr+0x180/0x180 [ 1054.828679][T11004] ? ___might_sleep+0x163/0x2c0 [ 1054.833606][T11004] __should_failslab+0x121/0x190 [ 1054.838571][T11004] should_failslab+0x9/0x14 [ 1054.843292][T11004] __kmalloc_track_caller+0x2dc/0x760 [ 1054.848838][T11004] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1054.855724][T11004] ? strndup_user+0x77/0xd0 [ 1054.860387][T11004] memdup_user+0x26/0xd0 [ 1054.864653][T11004] strndup_user+0x77/0xd0 [ 1054.869007][T11004] __x64_sys_mount+0x132/0x230 [ 1054.873796][T11004] do_syscall_64+0xfa/0x790 [ 1054.878321][T11004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1054.884227][T11004] RIP: 0033:0x45b349 [ 1054.888137][T11004] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:40:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 14:40:33 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="309afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1054.908274][T11004] RSP: 002b:00007f3d01da3c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1054.916720][T11004] RAX: ffffffffffffffda RBX: 00007f3d01da46d4 RCX: 000000000045b349 [ 1054.924718][T11004] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1054.933834][T11004] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1054.941828][T11004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1054.949824][T11004] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000001 [ 1055.038288][T11016] kAFS: unparsable volume name 14:40:33 executing program 5 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:33 executing program 4 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="0f0000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 14:40:33 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="329afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1055.185531][T11024] FAULT_INJECTION: forcing a failure. [ 1055.185531][T11024] name failslab, interval 1, probability 0, space 0, times 0 14:40:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="c00000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) [ 1055.274028][T11024] CPU: 0 PID: 11024 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 1055.276743][T11029] FAULT_INJECTION: forcing a failure. [ 1055.276743][T11029] name failslab, interval 1, probability 0, space 0, times 0 [ 1055.296649][T11024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1055.306717][T11024] Call Trace: [ 1055.306753][T11024] dump_stack+0x197/0x210 [ 1055.306774][T11024] should_fail.cold+0xa/0x15 [ 1055.306796][T11024] ? fault_create_debugfs_attr+0x180/0x180 [ 1055.306816][T11024] ? ___might_sleep+0x163/0x2c0 [ 1055.306835][T11024] __should_failslab+0x121/0x190 [ 1055.306854][T11024] should_failslab+0x9/0x14 [ 1055.306869][T11024] kmem_cache_alloc+0x2aa/0x710 [ 1055.306886][T11024] ? __might_fault+0x12b/0x1e0 [ 1055.306899][T11024] ? find_held_lock+0x35/0x130 [ 1055.306916][T11024] getname_flags+0xd6/0x5b0 [ 1055.306939][T11024] user_path_at_empty+0x2f/0x50 [ 1055.330531][T11031] kAFS: unparsable volume name [ 1055.335132][T11024] do_mount+0x150/0x1b50 [ 1055.335156][T11024] ? copy_mount_string+0x40/0x40 [ 1055.335175][T11024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1055.335193][T11024] ? _copy_from_user+0x12c/0x1a0 [ 1055.335210][T11024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1055.335226][T11024] ? copy_mount_options+0x2e8/0x3f0 [ 1055.335250][T11024] __x64_sys_mount+0x192/0x230 [ 1055.335269][T11024] do_syscall_64+0xfa/0x790 [ 1055.335290][T11024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1055.335301][T11024] RIP: 0033:0x45b349 [ 1055.335316][T11024] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1055.335323][T11024] RSP: 002b:00007f3d01da3c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1055.451785][T11024] RAX: ffffffffffffffda RBX: 00007f3d01da46d4 RCX: 000000000045b349 [ 1055.460134][T11024] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1055.468231][T11024] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1055.476739][T11024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1055.484950][T11024] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000002 [ 1055.500064][T11029] CPU: 1 PID: 11029 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1055.509665][T11029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1055.519995][T11029] Call Trace: 14:40:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 14:40:34 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5c9afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1055.523316][T11029] dump_stack+0x197/0x210 [ 1055.527772][T11029] should_fail.cold+0xa/0x15 [ 1055.532560][T11029] ? fault_create_debugfs_attr+0x180/0x180 [ 1055.538544][T11029] ? ___might_sleep+0x163/0x2c0 [ 1055.543568][T11029] __should_failslab+0x121/0x190 [ 1055.548529][T11029] should_failslab+0x9/0x14 [ 1055.553063][T11029] __kmalloc_track_caller+0x2dc/0x760 [ 1055.558549][T11029] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1055.564815][T11029] ? strndup_user+0x77/0xd0 [ 1055.569429][T11029] memdup_user+0x26/0xd0 14:40:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="c00e00001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) [ 1055.573691][T11029] strndup_user+0x77/0xd0 [ 1055.578041][T11029] __x64_sys_mount+0x132/0x230 [ 1055.582955][T11029] do_syscall_64+0xfa/0x790 [ 1055.587522][T11029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1055.593449][T11029] RIP: 0033:0x45b349 [ 1055.597446][T11029] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1055.617170][T11029] RSP: 002b:00007f46e199ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1055.625700][T11029] RAX: ffffffffffffffda RBX: 00007f46e199f6d4 RCX: 000000000045b349 [ 1055.633688][T11029] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1055.641982][T11029] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1055.650635][T11029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1055.658734][T11029] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000001 [ 1055.764245][T11041] kAFS: unparsable volume name 14:40:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) ptrace(0x8, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 14:40:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="effd00001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:35 executing program 5 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:35 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:35 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe255d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="e03f03001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 14:40:35 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe2e5d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480200201400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) [ 1056.474116][T11066] FAULT_INJECTION: forcing a failure. [ 1056.474116][T11066] name failslab, interval 1, probability 0, space 0, times 0 14:40:35 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="259afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1056.674466][T11066] CPU: 1 PID: 11066 Comm: syz-executor.5 Not tainted 5.5.0-rc7-syzkaller #0 [ 1056.683295][T11066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1056.693510][T11066] Call Trace: [ 1056.696828][T11066] dump_stack+0x197/0x210 [ 1056.701181][T11066] should_fail.cold+0xa/0x15 [ 1056.705804][T11066] ? fault_create_debugfs_attr+0x180/0x180 [ 1056.711631][T11066] ? ___might_sleep+0x163/0x2c0 [ 1056.716600][T11066] __should_failslab+0x121/0x190 [ 1056.721558][T11066] should_failslab+0x9/0x14 [ 1056.726115][T11066] kmem_cache_alloc+0x2aa/0x710 [ 1056.730987][T11066] ? __might_fault+0x12b/0x1e0 [ 1056.735812][T11066] ? find_held_lock+0x35/0x130 [ 1056.740613][T11066] getname_flags+0xd6/0x5b0 [ 1056.745249][T11066] user_path_at_empty+0x2f/0x50 [ 1056.750125][T11066] do_mount+0x150/0x1b50 [ 1056.754412][T11066] ? copy_mount_string+0x40/0x40 [ 1056.759372][T11066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1056.765727][T11066] ? _copy_from_user+0x12c/0x1a0 [ 1056.770690][T11066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1056.776952][T11066] ? copy_mount_options+0x2e8/0x3f0 [ 1056.782193][T11066] __x64_sys_mount+0x192/0x230 [ 1056.786982][T11066] do_syscall_64+0xfa/0x790 [ 1056.791944][T11066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.798042][T11066] RIP: 0033:0x45b349 [ 1056.802135][T11066] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1056.821886][T11066] RSP: 002b:00007f46e199ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1056.830324][T11066] RAX: ffffffffffffffda RBX: 00007f46e199f6d4 RCX: 000000000045b349 [ 1056.838917][T11066] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1056.847095][T11066] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1056.855191][T11066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1056.863177][T11066] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000002 14:40:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f0000000340)=""/92, 0xfffffffffffffd92, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x0}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:40:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="00f0ff7f1400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:35 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="309afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1057.075166][T11081] kAFS: unparsable volume name 14:40:35 executing program 5 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5f0b0000}, 0x0) 14:40:35 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe2f5d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="effdffff1400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) [ 1057.192653][T30270] ------------[ cut here ]------------ [ 1057.198741][T30270] name 'šþ/]uwo,"¹cðacýµ‚•´[²$ð“5x~µsþ&æ¡tw}ùª™zºcp(' [ 1057.206346][T30270] WARNING: CPU: 0 PID: 30270 at fs/proc/generic.c:178 __xlate_proc_name+0xe7/0x110 [ 1057.215667][T30270] Kernel panic - not syncing: panic_on_warn set ... [ 1057.222358][T30270] CPU: 0 PID: 30270 Comm: kworker/0:1 Not tainted 5.5.0-rc7-syzkaller #0 [ 1057.230782][T30270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1057.240920][T30270] Workqueue: afs afs_manage_cell [ 1057.245901][T30270] Call Trace: [ 1057.249207][T30270] dump_stack+0x197/0x210 [ 1057.253640][T30270] ? __xlate_proc_name+0x50/0x110 [ 1057.258837][T30270] panic+0x2e3/0x75c [ 1057.262763][T30270] ? add_taint.cold+0x16/0x16 [ 1057.267461][T30270] ? __kasan_check_write+0x14/0x20 [ 1057.272591][T30270] ? __warn.cold+0x14/0x3e [ 1057.277028][T30270] ? __warn+0xd9/0x1cf [ 1057.281125][T30270] ? __xlate_proc_name+0xe7/0x110 [ 1057.286163][T30270] __warn.cold+0x2f/0x3e 14:40:36 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="329afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1057.290426][T30270] ? __xlate_proc_name+0xe7/0x110 [ 1057.297240][T30270] report_bug+0x289/0x300 [ 1057.301591][T30270] do_error_trap+0x11b/0x200 [ 1057.306729][T30270] do_invalid_op+0x37/0x50 [ 1057.311163][T30270] ? __xlate_proc_name+0xe7/0x110 [ 1057.316229][T30270] invalid_op+0x23/0x30 [ 1057.320398][T30270] RIP: 0010:__xlate_proc_name+0xe7/0x110 14:40:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000040000190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) [ 1057.326037][T30270] Code: af 09 91 ff 44 89 e0 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 98 09 91 ff 4c 89 fe 48 c7 c7 40 07 39 88 e8 88 b9 61 ff <0f> 0b 41 bc fe ff ff ff eb cb 4c 89 f7 e8 b7 c9 ce ff e9 3d ff ff [ 1057.345843][T30270] RSP: 0018:ffffc900078479d0 EFLAGS: 00010282 [ 1057.352010][T30270] RAX: 0000000000000000 RBX: ffff8880993b953b RCX: 0000000000000000 [ 1057.360038][T30270] RDX: 0000000000000000 RSI: ffffffff815e5326 RDI: fffff52000f08f2c [ 1057.368032][T30270] RBP: ffffc90007847a00 R08: ffff8880a15bc500 R09: fffffbfff165e79e [ 1057.375399][T11092] kAFS: unparsable volume name [ 1057.376032][T30270] R10: fffffbfff165e79d R11: ffffffff8b2f3cef R12: 0000000000000000 [ 1057.376060][T30270] R13: ffff8880993b9539 R14: ffffc90007847b08 R15: ffff8880993b9539 [ 1057.376149][T30270] ? vprintk_func+0x86/0x189 [ 1057.401440][T30270] __proc_create+0xac/0x860 [ 1057.406081][T30270] ? pde_free+0x110/0x110 [ 1057.410583][T30270] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1057.416878][T30270] proc_mkdir_data+0xbc/0x1b0 [ 1057.421593][T30270] ? proc_symlink+0x1c0/0x1c0 [ 1057.426346][T30270] ? fscache_free_cookie+0x110/0x1c0 [ 1057.432576][T30270] afs_proc_cell_setup+0x95/0x190 [ 1057.437623][T30270] afs_manage_cell+0x54b/0x1410 [ 1057.442499][T30270] ? afs_put_cell.part.0+0x180/0x180 [ 1057.448038][T30270] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1057.454223][T30270] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1057.460223][T30270] ? trace_hardirqs_on+0x67/0x240 [ 1057.465360][T30270] process_one_work+0x9af/0x1740 [ 1057.470336][T30270] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1057.476249][T30270] ? lock_acquire+0x190/0x410 [ 1057.480974][T30270] worker_thread+0x98/0xe40 [ 1057.485493][T30270] ? trace_hardirqs_on+0x67/0x240 [ 1057.490743][T30270] kthread+0x361/0x430 [ 1057.494833][T30270] ? process_one_work+0x1740/0x1740 [ 1057.500048][T30270] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 1057.505790][T30270] ret_from_fork+0x24/0x30 [ 1057.512284][T30270] Kernel Offset: disabled [ 1057.516821][T30270] Rebooting in 86400 seconds..