Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.111' (ECDSA) to the list of known hosts. 2020/09/27 12:54:17 fuzzer started 2020/09/27 12:54:17 dialing manager at 10.128.0.105:38519 2020/09/27 12:54:18 syscalls: 3234 2020/09/27 12:54:18 code coverage: enabled 2020/09/27 12:54:18 comparison tracing: enabled 2020/09/27 12:54:18 extra coverage: extra coverage is not supported by the kernel 2020/09/27 12:54:18 setuid sandbox: enabled 2020/09/27 12:54:18 namespace sandbox: enabled 2020/09/27 12:54:18 Android sandbox: enabled 2020/09/27 12:54:18 fault injection: enabled 2020/09/27 12:54:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/09/27 12:54:18 net packet injection: enabled 2020/09/27 12:54:18 net device setup: enabled 2020/09/27 12:54:18 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/09/27 12:54:18 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/09/27 12:54:18 USB emulation: /dev/raw-gadget does not exist 2020/09/27 12:54:18 hci packet injection: enabled 2020/09/27 12:54:18 wifi device emulation: enabled 12:55:57 executing program 0: sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{0x48}, {0x6}]}) syzkaller login: [ 139.655335] audit: type=1400 audit(1601211357.979:8): avc: denied { execmem } for pid=6500 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 12:55:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x11) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0xc) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x8982, &(0x7f0000000040)={r0, r2}) recvmsg$kcm(r1, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4030) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000800000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) 12:55:58 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2d) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000)='net_prio.ifpriomap\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x4, 0x70, 0x1f, 0x0, 0x3f, 0x0, 0x0, 0xc6c2, 0x808, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x2092, 0x0, 0x2a2, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r1, 0x12) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000240), 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x5}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400c00) 12:55:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @remote}}}], 0x20}, 0x0) 12:55:58 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x2}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=[@ip_tos_u8={{0x11, 0x34000}}, @ip_pktinfo={{0x1c, 0xfd000000, 0x8, {0x0, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp={0x2, 0x10, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}, @ip_tos_u8={{0x14}}], 0x98}, 0x0) 12:55:58 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141440e0", 0x0, 0x9}, 0x28) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x7, 0x0, &(0x7f0000000a40)='syzkaller\x00', 0x7, 0x29, &(0x7f0000000a80)=""/41, 0xc1000, 0x0, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x0, 0x0, 0x86e, 0x80000000}, 0x10, 0xce71}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xfffffff9, 0x99, &(0x7f0000000380)=""/153, 0x41100, 0x2, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) [ 140.839743] IPVS: ftp: loaded support on port[0] = 21 [ 141.000079] IPVS: ftp: loaded support on port[0] = 21 [ 141.025901] chnl_net:caif_netlink_parms(): no params data found [ 141.157312] IPVS: ftp: loaded support on port[0] = 21 [ 141.242628] chnl_net:caif_netlink_parms(): no params data found [ 141.292797] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.300294] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.315166] device bridge_slave_0 entered promiscuous mode [ 141.362921] IPVS: ftp: loaded support on port[0] = 21 [ 141.374557] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.382774] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.390798] device bridge_slave_1 entered promiscuous mode [ 141.442179] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.454956] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.491712] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 141.517360] team0: Port device team_slave_0 added [ 141.536503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 141.544103] team0: Port device team_slave_1 added [ 141.600203] IPVS: ftp: loaded support on port[0] = 21 [ 141.712327] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 141.712985] IPVS: ftp: loaded support on port[0] = 21 [ 141.719473] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 141.751079] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 141.788749] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.795124] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.803446] device bridge_slave_0 entered promiscuous mode [ 141.815660] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.823776] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.832180] device bridge_slave_1 entered promiscuous mode [ 141.839749] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 141.846977] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 141.872576] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 141.908879] chnl_net:caif_netlink_parms(): no params data found [ 141.928324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 141.964963] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 141.975297] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.030557] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.071622] device hsr_slave_0 entered promiscuous mode [ 142.077637] device hsr_slave_1 entered promiscuous mode [ 142.121062] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 142.134090] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.143824] team0: Port device team_slave_0 added [ 142.152515] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 142.161143] team0: Port device team_slave_1 added [ 142.181871] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 142.228761] chnl_net:caif_netlink_parms(): no params data found [ 142.285459] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 142.293798] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.321840] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 142.362815] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.370412] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.379328] device bridge_slave_0 entered promiscuous mode [ 142.388655] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 142.394900] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.420824] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 142.434236] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 142.456270] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.462646] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.471847] device bridge_slave_1 entered promiscuous mode [ 142.497325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 142.568600] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.602422] device hsr_slave_0 entered promiscuous mode [ 142.608345] device hsr_slave_1 entered promiscuous mode [ 142.620012] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.657960] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 142.672855] chnl_net:caif_netlink_parms(): no params data found [ 142.718573] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 142.748496] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.756682] team0: Port device team_slave_0 added [ 142.793189] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 142.801794] team0: Port device team_slave_1 added [ 142.816174] chnl_net:caif_netlink_parms(): no params data found [ 142.856737] Bluetooth: hci0: command 0x0409 tx timeout [ 142.899415] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.905791] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.914934] device bridge_slave_0 entered promiscuous mode [ 142.939049] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 142.945371] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.971614] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 142.995521] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.002067] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.009882] device bridge_slave_1 entered promiscuous mode [ 143.016076] Bluetooth: hci1: command 0x0409 tx timeout [ 143.035003] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 143.041603] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.068984] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 143.085160] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.094945] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 143.114734] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 143.147367] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 143.176054] Bluetooth: hci2: command 0x0409 tx timeout [ 143.182967] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 143.212199] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.219786] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.228888] device bridge_slave_0 entered promiscuous mode [ 143.239737] device hsr_slave_0 entered promiscuous mode [ 143.246248] device hsr_slave_1 entered promiscuous mode [ 143.254896] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 143.263216] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.270403] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.277998] device bridge_slave_0 entered promiscuous mode [ 143.303031] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.309657] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.317316] device bridge_slave_1 entered promiscuous mode [ 143.323857] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 143.336235] Bluetooth: hci3: command 0x0409 tx timeout [ 143.341648] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.348446] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.355449] device bridge_slave_1 entered promiscuous mode [ 143.381847] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.390765] team0: Port device team_slave_0 added [ 143.403295] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.411843] team0: Port device team_slave_1 added [ 143.451452] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 143.461395] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 143.487848] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 143.494114] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.521258] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 143.550100] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 143.559901] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 143.576199] Bluetooth: hci4: command 0x0409 tx timeout [ 143.590180] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 143.596731] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.622806] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 143.644084] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 143.661680] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.662468] Bluetooth: hci5: command 0x0409 tx timeout [ 143.670047] team0: Port device team_slave_0 added [ 143.681119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 143.692987] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 143.701186] team0: Port device team_slave_0 added [ 143.707784] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.715421] team0: Port device team_slave_1 added [ 143.721965] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 143.729765] team0: Port device team_slave_1 added [ 143.735030] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 143.804065] device hsr_slave_0 entered promiscuous mode [ 143.810642] device hsr_slave_1 entered promiscuous mode [ 143.817331] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 143.835615] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 143.843196] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.869492] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 143.882862] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 143.889784] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.915644] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 143.932684] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 143.939193] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.964490] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 143.975102] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 143.995029] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.010852] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 144.017560] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 144.043018] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 144.054220] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 144.062208] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.081543] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 144.154108] device hsr_slave_0 entered promiscuous mode [ 144.160167] device hsr_slave_1 entered promiscuous mode [ 144.212197] device hsr_slave_0 entered promiscuous mode [ 144.218329] device hsr_slave_1 entered promiscuous mode [ 144.225175] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 144.234267] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 144.244002] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 144.261786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.272357] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.292748] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 144.323719] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 144.333684] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 144.349525] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 144.409602] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 144.420652] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 144.433119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.441330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.448790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.457001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.473119] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 144.482565] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 144.489512] 8021q: adding VLAN 0 to HW filter on device team0 [ 144.498728] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 144.504808] 8021q: adding VLAN 0 to HW filter on device team0 [ 144.537916] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 144.548643] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 144.571855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.580331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.588807] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.595319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.602616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.610988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.618956] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.625311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.654162] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 144.674870] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 144.682390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.690304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.698408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.706450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.714032] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.720447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.728457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.736579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.744178] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.750582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.779344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 144.795423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 144.808636] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 144.830887] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 144.838129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 144.848013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 144.867756] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 144.881235] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 144.891016] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 144.901633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 144.910565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 144.918784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 144.929200] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 144.937143] Bluetooth: hci0: command 0x041b tx timeout [ 144.940903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 144.958517] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 144.968513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 144.975593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 144.984393] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 144.992497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.000963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.016376] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 145.027247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 145.044472] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 145.054374] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.062053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.070325] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.078543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.086477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.094060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.096138] Bluetooth: hci1: command 0x041b tx timeout [ 145.104275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.117263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 145.134747] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.144748] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 145.151896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.161237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.172295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.181466] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 145.211523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.220081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.232696] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 145.239584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.249917] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.258177] Bluetooth: hci2: command 0x041b tx timeout [ 145.278023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.291848] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.301788] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 145.316485] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 145.327073] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.338311] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 145.344379] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.351624] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 145.358749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 145.365409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.372854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.390096] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 145.403589] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 145.416775] Bluetooth: hci3: command 0x041b tx timeout [ 145.421947] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.437550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 145.445730] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 145.453994] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 145.467117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.474883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.482568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.489745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.497890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.505475] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.511905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.519188] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 145.525855] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 145.537216] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 145.543308] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.556372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 145.569025] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.576679] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.582933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.590304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.598478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.606370] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.612715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.623122] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 145.635850] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 145.652698] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.659632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 145.666242] Bluetooth: hci4: command 0x041b tx timeout [ 145.668541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 145.682074] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 145.692829] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.703976] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 145.710201] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.718327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 145.729063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.737371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.744922] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.746282] Bluetooth: hci5: command 0x041b tx timeout [ 145.751337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.763918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.771060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.778257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.788356] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 145.803596] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 145.811660] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 145.826683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.833996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.846867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.854448] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.860906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.868652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.875533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.882868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 145.893375] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 145.902979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 145.913132] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 145.924557] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.932690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 145.946745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.955439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.963826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.971920] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.978343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.986255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.995668] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 146.006612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 146.015475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 146.030717] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 146.044589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 146.053729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 146.063037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.071443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.079717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.088777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.097366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.104954] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.111368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.118949] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.128431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 146.138388] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 146.145459] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 146.152442] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 146.160395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 146.170981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 146.182366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 146.190410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.199568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.208378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.218264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.226140] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.237668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.244567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.252732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.260816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.271804] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 146.283471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 146.295709] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 146.308255] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.315497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.330900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.339902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.348001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.355725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.363950] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.370378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.377986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.391330] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 146.402459] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 146.412522] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 146.425351] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 146.434895] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 146.442070] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 146.451192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 146.458832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 146.467497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.474892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.483481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.491890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.499802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.508290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.515706] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 146.523411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.533101] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 146.542104] device veth0_vlan entered promiscuous mode [ 146.551295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 146.562709] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 146.573121] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 146.579364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.589630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 146.598042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.608248] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.615801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.625246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.633288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.641486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.652005] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 146.662362] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 146.694842] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 146.705673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.723616] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.731874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.741681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.749762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 146.757596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.765477] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 146.772884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.785399] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 146.794851] device veth0_vlan entered promiscuous mode [ 146.807092] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 146.825091] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 146.835607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.845889] device veth1_vlan entered promiscuous mode [ 146.853273] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 146.864506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 146.878428] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 146.887384] device veth1_vlan entered promiscuous mode [ 146.893369] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 146.902812] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 146.911592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 146.920868] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 146.929772] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 146.937902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.945708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.954190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 146.961247] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 146.968132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 146.974893] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 146.981991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.989758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.000387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 147.018152] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 147.027142] Bluetooth: hci0: command 0x040f tx timeout [ 147.035266] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 147.043526] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 147.053261] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 147.064921] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 147.072197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.079809] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 147.088972] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 147.099431] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.108539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.116576] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.124150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.132055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.143714] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.156949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 147.168340] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 147.179457] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.186231] Bluetooth: hci1: command 0x040f tx timeout [ 147.187881] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 147.201835] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 147.212871] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 147.222678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.230716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.238977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.247466] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.255142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.279553] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 147.292806] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 147.312264] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 147.322527] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 147.333090] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 147.340639] Bluetooth: hci2: command 0x040f tx timeout [ 147.351996] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 147.362919] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 147.371146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 147.379953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 147.388561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 147.404742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 147.416982] device veth0_macvtap entered promiscuous mode [ 147.423576] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 147.433559] device veth0_macvtap entered promiscuous mode [ 147.440519] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 147.449147] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 147.457325] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 147.467478] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 147.474718] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 147.483582] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 147.490811] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 147.498268] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 147.504949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 147.506484] Bluetooth: hci3: command 0x040f tx timeout [ 147.519742] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 147.528359] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 147.541419] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 147.554793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 147.564118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.573500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 147.585705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.595901] device veth1_macvtap entered promiscuous mode [ 147.603265] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 147.612268] device veth1_macvtap entered promiscuous mode [ 147.619941] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 147.640925] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.659688] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.668984] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 147.682307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 147.707622] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 147.719759] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 147.732455] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 147.740523] Bluetooth: hci4: command 0x040f tx timeout [ 147.762988] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 147.778452] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 147.785048] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 147.794279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 147.804654] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 147.816767] Bluetooth: hci5: command 0x040f tx timeout [ 147.821385] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 147.830232] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 147.840349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.848960] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.856993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 147.864801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.873658] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 147.881855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 147.892406] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 147.902695] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 147.914042] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 147.921140] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 147.930244] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 147.942418] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 147.951779] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 147.964878] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 147.978147] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 147.985624] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.003910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.012314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 148.020600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.029509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 148.037265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.048296] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 148.055152] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 148.064424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 148.079929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.090916] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 148.098696] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 148.107810] device veth0_vlan entered promiscuous mode [ 148.116573] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.123635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.131221] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 148.139811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 148.148144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 148.155880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 148.167226] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 148.180846] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 148.189444] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 148.196203] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 148.213065] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 148.221310] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 148.229265] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 148.236586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 148.244237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.255775] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.262993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.283368] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 148.353782] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 148.368426] device veth0_vlan entered promiscuous mode [ 148.377777] device veth1_vlan entered promiscuous mode [ 148.384366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 148.393015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.400954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 148.408821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.418805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.425842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.434833] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.442764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.468362] device veth0_vlan entered promiscuous mode [ 148.476779] device veth0_vlan entered promiscuous mode [ 148.510601] device veth1_vlan entered promiscuous mode [ 148.525521] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 148.552308] device veth1_vlan entered promiscuous mode [ 148.563074] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 148.573420] device veth1_vlan entered promiscuous mode [ 148.585378] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 148.598277] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 148.627235] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 148.643881] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 148.665915] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 148.677119] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 148.686098] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 148.693501] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 148.701722] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 148.710238] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 148.718233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.725860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.737263] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 148.746418] device veth0_macvtap entered promiscuous mode [ 148.752994] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 148.773813] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 148.783772] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 148.792142] device veth0_macvtap entered promiscuous mode [ 148.805864] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 148.813556] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 148.821353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.829392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.837582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.845208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.853315] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 148.867213] device veth1_macvtap entered promiscuous mode [ 148.873709] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 148.885574] device veth0_macvtap entered promiscuous mode [ 148.893740] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 148.904022] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 148.913970] device veth1_macvtap entered promiscuous mode [ 148.921274] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 148.936473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 148.943505] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.951391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.961317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 148.968741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.977318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.990423] device veth0_macvtap entered promiscuous mode [ 148.997721] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 149.010103] device veth1_macvtap entered promiscuous mode [ 149.024616] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 149.035190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 149.056528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 149.072754] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 149.084731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 149.093445] device veth1_macvtap entered promiscuous mode [ 149.100418] Bluetooth: hci0: command 0x0419 tx timeout [ 149.107907] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 149.121026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.141980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.161676] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.191189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.211162] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 149.218632] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 149.230223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 149.241288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 149.249796] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.259934] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.267719] Bluetooth: hci1: command 0x0419 tx timeout [ 149.269136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.284163] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.293369] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.303411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.314738] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 149.321812] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 149.339556] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.347124] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 149.354629] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.362352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.370440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.379439] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.387565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.397181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.408902] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.418967] Bluetooth: hci2: command 0x0419 tx timeout [ 149.421509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.434074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.444953] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 149.451929] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 149.460948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.471305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.480559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.490371] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.501047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.510839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.520042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.529804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.539961] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 149.547100] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 149.559388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.569336] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.579423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.586986] Bluetooth: hci3: command 0x0419 tx timeout [ 149.589218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.603631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.613421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.624517] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 149.631651] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 149.639129] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.649109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 149.663334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.671395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.679516] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.687884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 149.709363] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 149.717716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.729649] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.740294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.751772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.760997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.770856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.780037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.789824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.800554] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 149.807740] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 149.816655] Bluetooth: hci4: command 0x0419 tx timeout [ 149.822665] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 149.843068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.859713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.871394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.883107] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.893149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.903735] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.913491] Bluetooth: hci5: command 0x0419 tx timeout [ 149.919202] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.929351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.938550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.948355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.959836] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 149.967339] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 149.974416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.984097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 149.993609] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 150.002549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 150.033072] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 150.042158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.053718] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.063764] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.074050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.083276] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.093078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.102287] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.112057] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.122106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.131883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.143118] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 150.151005] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 150.169770] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 150.189748] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 150.206665] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 150.213885] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 150.223645] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 150.246847] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 150.254830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.286415] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 150.373347] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 150.414912] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 150.421644] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 150.433979] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 150.467865] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 150.476313] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 150.497948] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 150.512830] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 150.784162] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 150.807188] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 12:56:09 executing program 0: r0 = socket(0x2, 0x5, 0x0) recvfrom(r0, 0x0, 0x0, 0x80080, 0x0, 0x0) [ 150.845481] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 150.851835] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 150.884935] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 150.916214] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 150.923345] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 12:56:09 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r3, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f0000000340)={"63c5d8b0bd534800cb625c7d8dbc7193", 0x0, 0x0, {0x0, 0x3}, {}, 0x0, [0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x1000, 0x0, 0x0, 0x2, 0x0, 0x80000001, 0xfffffffffffffffa, 0x80000000, 0xffb]}) write$cgroup_int(r4, &(0x7f0000000200), 0x4010040c000) [ 150.998973] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 151.034252] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 151.064107] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 151.103968] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 151.137219] audit: type=1804 audit(1601211369.459:9): pid=7969 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir710444861/syzkaller.qZCzI6/2/memory.events" dev="sda1" ino=15751 res=1 12:56:09 executing program 0: r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000380)="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"/343, 0x157, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 12:56:09 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r3, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000580)={0x270, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x2420, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x92}}, {0x14, 0x2, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3e}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg2\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3f, @private1={0xfc, 0x1, [], 0x1}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x40, @private0={0xfc, 0x0, [], 0x1}, 0x100}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth0_virt_wifi\x00'}}]}, @TIPC_NLA_BEARER={0xac, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x3f, @dev, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x60}]}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "e2917d170cb158a706cdab9f9f8eb923f27b1a9276ea976970e7f47fdd283c"}}, @TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "c6157c3f3c08e303545d370000000000002a1441b9f219"}}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000000}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x270}, 0x1, 0x0, 0x0, 0x8840}, 0x40000) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$nl_generic(0x10, 0x3, 0x10) write$cgroup_int(r4, &(0x7f0000000200), 0x4010040c000) 12:56:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000003100)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000b06010300000000000000000000000005000100070000000900020073797a3000000000100007800c000180"], 0x38}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) [ 151.224882] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 151.239374] audit: type=1800 audit(1601211369.499:10): pid=7969 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=15751 res=0 [ 151.264650] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 151.284151] audit: type=1804 audit(1601211369.499:11): pid=7969 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir710444861/syzkaller.qZCzI6/2/memory.events" dev="sda1" ino=15751 res=1 [ 151.343589] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 151.359839] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 151.376406] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 151.405640] audit: type=1804 audit(1601211369.729:12): pid=8011 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir294681481/syzkaller.xnnGUJ/1/cgroup.controllers" dev="sda1" ino=15751 res=1 12:56:09 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r3, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000580)={0x34c, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x180, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x2420, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x92}}, {0x14, 0x2, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3e}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @private2={0xfc, 0x2, [], 0x1}, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @mcast1, 0x6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg2\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x94d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3f, @private1={0xfc, 0x1, [], 0x1}, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @private0={0xfc, 0x0, [], 0x1}, 0x100}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth0_virt_wifi\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xf1b}]}, @TIPC_NLA_BEARER={0x84, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}, @TIPC_NLA_NODE={0xd8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ID={0x43, 0x3, "191325af05bc0b4a97965eb36f4e666b514bcd445964ba691a44d57e54babf0adf46a72faf443cbaec2fd218540eba6ec2093461fdb6fbd97dde9c35933f66"}, @TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "e2917d170cb158a706cdab9f9f8eb923f27b1a9276ea976970e7f47fdd283c"}}, @TIPC_NLA_NODE_KEY={0x40, 0x4, {'gcm(aes)\x00', 0x18, "c6157c3f3c08e303545d370000000000002a1441b9f219d9"}}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x34c}, 0x1, 0x0, 0x0, 0x8840}, 0x40000) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f0000000340)={"63c5d8b0bd534800cb625c7d8dbc7193", 0x0, 0x0, {0x0, 0x3}, {0x0, 0x2}, 0x0, [0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x1000, 0x0, 0x0, 0x2, 0x0, 0x80000001, 0xfffffffffffffffa, 0x80000000, 0xffb]}) write$cgroup_int(r4, &(0x7f0000000200), 0x4010040c000) [ 151.509102] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 151.526654] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 151.528126] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 151.539931] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 12:56:09 executing program 4: r0 = socket(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000200)=0x8) r1 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000280), &(0x7f00000002c0)=0x8) r2 = socket(0x2, 0x5, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000100)={0x800}, 0x10) 12:56:09 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) [ 151.566304] audit: type=1800 audit(1601211369.889:13): pid=8027 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=15752 res=0 [ 151.622229] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 151.641571] audit: type=1804 audit(1601211369.899:14): pid=8028 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir710444861/syzkaller.qZCzI6/5/memory.events" dev="sda1" ino=15752 res=1 [ 151.674776] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 151.676007] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 151.725051] audit: type=1804 audit(1601211369.899:15): pid=8027 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir710444861/syzkaller.qZCzI6/5/memory.events" dev="sda1" ino=15752 res=1 [ 151.752830] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 151.765188] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 151.777332] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 151.799431] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 151.815006] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 151.834608] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 151.898886] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 151.908241] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 151.924071] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 151.990084] hrtimer: interrupt took 44111 ns 12:56:10 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r3, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000580)={0xa8, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x68, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x60}]}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0xa8}}, 0x40000) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x4010040c000) 12:56:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d2c}], 0x1}, 0x4) 12:56:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x318, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}]}, 0x40}}, 0x0) 12:56:10 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x144, 0x10, 0x713, 0x70bd29, 0x0, {{@in=@local, @in6=@mcast2, 0x4e23, 0x6, 0x0, 0x0, 0x0, 0x20}, {@in6=@empty, 0x0, 0x32}, @in=@empty, {}, {0x0, 0x2000000000000000}, {}, 0x70bd2d, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @offload={0xc}]}, 0x144}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xfffffffffffff791, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000001c0)=0x9, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r4, r5, 0x0, 0xf03b0000) sendfile(r4, r3, 0x0, 0x8000000000004) accept4$alg(r3, 0x0, 0x0, 0x80000) 12:56:10 executing program 3: r0 = socket(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f0000000240), &(0x7f0000000280)=0x4) 12:56:10 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487509101cba12c07d57d995b61e89a4530f923062242b416ae9eeefc0e9c60ebab1c17682dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837448a4ca03767c69ce5f2a2b7b96b0feb4af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8674c499f5eb7b6bda90300000000000000836c98b58cf1fe50917b2c6b05e6001c29d7ca47dc62a087cc7f0e053927bc50e40a369aba3b08f0a8620c4d29eff8408ea28a6cb9fc8e7d360fced56ead5fa0c52f90bafb888ed8aa8d5d70cf2ec06edc22ca72157003b8beb850e2007f6118f6df8235d0fe1428c367c2d625414413dc04d025d4a6b727e1cd4bd9c6e123e37c81956901005352068bc40073b07ebe8e7023fb0ce22c76445275d13012e6d6e8304744704a88401b58461f89c9de98bbb0b91f080a0a6c0880e71efc8444c7a0bafa52c314250c709216f24d9e8ceb6ef708d56be4548dc36a359f0753174b766e0cfd836d81f7a18e02999483fc914f98eed61b12d87de304d73f4551301a24652a2c539c24af27a773bc206164fd64ed65fcc34c56040bf4c1315da2b2cbd54e4061eeef8aa908eae11a97af000000008b335accc588a66ce3155c7d14504a2c88d7ba066397d50e888e7f8ec8dd6ef48546127593b8b230c2496951629d7aab90cb7821e8aa04d014e935b4a10d5d8a4dc4ad752968981692612a6f7c93df32ea63b18ce9c3faa3e82ce9ce755b8127329495faaeeaafeb8a06db79334b94c06e9c58bf51d551471ad77c4db23ac9a11fa42a3df2e91155d8c4c72cdbbbc08ca1b02c9c7869129f3335c0d88ba0455e75520a583fb71fea4688b0d4b07fb65c658ab8181e11ea9ed4430cac9da320b7228229778b93e30ebcdfc9e7abf1fbb802146c25ee958cec146b0f8c40e06f93b310f44b64b4c9dbc08836a7d7d4f1a422c9ec5c7cc0f459f80bc6403ed89a47373534822c3eedc3566062aaac6aac8e6fb69e950b0a175737eb8fd5b1a60a3b07cc11669c14245ec90000000000000000002e4936d62ea967806def9c0f660e31ae510324f291619c9774012dc25becb0580b7769a045cf5d5247304b7bef6a670e9f210e767dd6b642f6471210b923195f440450d89b2087798b86eea72c95ee2917bd53d85587119c428c622335f7b720c5a2421ce526130214eaefbf157ffe18019629ee2fa725b1ffadad6b9031cb77bbd70891225b374e1f685b69422f75ac59a5faece0bd56224de22a36e67399ac7ec683ef9754e545aa0d6dc13fca61a5e529db342b6b7c21ea0b27a2ac0203ad6ceca4e21ae99beccd9d8a1d88cd1c9285f9489f3ee451a2b09ca3864fb4db860a3ad8ae30e486f416223c3e73ccef12ff664eb3660c2756bc5981883f5ccbdea1e280d2cd8dd22316eb41b5374916b4616d517f38121f272ac5ffca6b5ae96d0000c9b214124c699d66cad430949bc52d6836b3d3a4baab45c25e9bcf3e80019f2f277bfd833fdeb63ffa2027b0e5576f23de92c4f431daef51ed007005bccf6236888b1b9c7b4f8e3928c15d8890b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141440e0", 0x0, 0x9}, 0x28) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x7, 0x0, &(0x7f0000000a40)='syzkaller\x00', 0x7, 0x29, &(0x7f0000000a80)=""/41, 0xc1000, 0x0, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x0, 0x0, 0x86e, 0x80000000}, 0x10, 0xce71}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xfffffff9, 0x99, &(0x7f0000000380)=""/153, 0x41100, 0x2, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) [ 152.370683] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 12:56:10 executing program 3: r0 = socket(0x2, 0x5, 0x0) bind(r0, &(0x7f0000000100)=@un=@file={0xa}, 0xa) 12:56:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC=r0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000004060102e60001007a5800809affff000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000300) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 152.455787] audit: type=1800 audit(1601211370.779:16): pid=8079 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=15774 res=0 12:56:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0)={0x0, @in, 0x6}, 0xa0) 12:56:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)={0x2c, 0x17, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c000) 12:56:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='mm_page_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r2, 0x0) 12:56:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000280)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x8, 0x11, 0x0, @private0, @mcast2, {[], {0x0, 0xe22, 0x8}}}}}}, 0x0) [ 152.583893] audit: type=1804 audit(1601211370.809:17): pid=8083 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir565094811/syzkaller.5KVwVl/1/memory.events" dev="sda1" ino=15774 res=1 12:56:11 executing program 3: 12:56:11 executing program 4: [ 152.722055] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 12:56:11 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket(0x2, 0x5, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000200)=0x8) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x26, &(0x7f0000000100)={r4}, 0x8) [ 152.758565] audit: type=1804 audit(1601211370.809:18): pid=8079 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir565094811/syzkaller.5KVwVl/1/memory.events" dev="sda1" ino=15774 res=1 12:56:11 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0xfd, @multicast, 'wlan0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 12:56:11 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) sendmsg(r0, &(0x7f0000000200)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000080)="e8", 0x1}], 0x1}, 0x0) 12:56:11 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "20f2b1", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 12:56:11 executing program 3: 12:56:11 executing program 1: 12:56:11 executing program 0: 12:56:11 executing program 0: 12:56:11 executing program 3: 12:56:11 executing program 1: 12:56:11 executing program 4: r0 = socket(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x10, 0x2}, 0x10) getsockname$inet6(r0, 0x0, &(0x7f0000000680)) [ 153.314348] syz-executor.4 (8132) used greatest stack depth: 23744 bytes left 12:56:11 executing program 0: 12:56:11 executing program 1: 12:56:11 executing program 5: 12:56:11 executing program 3: 12:56:11 executing program 2: 12:56:11 executing program 0: 12:56:11 executing program 4: 12:56:11 executing program 1: 12:56:11 executing program 3: 12:56:11 executing program 1: 12:56:11 executing program 0: 12:56:11 executing program 4: 12:56:12 executing program 2: 12:56:12 executing program 5: 12:56:12 executing program 4: 12:56:12 executing program 3: 12:56:12 executing program 1: 12:56:12 executing program 0: 12:56:12 executing program 5: 12:56:12 executing program 2: 12:56:12 executing program 4: 12:56:12 executing program 1: 12:56:12 executing program 3: 12:56:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x288, 0x0, 0xd8, 0xd8, 0xc8, 0xd8, 0x1b8, 0x268, 0x268, 0x1b8, 0x268, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@remote, @loopback, [], [], 'wlan0\x00', 'erspan0\x00'}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'caif0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 12:56:12 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:56:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x2c, 0xa, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 12:56:12 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\v\x8b\x8a\xa9\x9fca\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000100)='\v\x8b\x8a\xa9\x9fca\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b', 0x3) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[], 0x5) sendfile(r1, r2, &(0x7f00000000c0), 0x2000000c) fcntl$addseals(r2, 0x409, 0xb) fremovexattr(r2, &(0x7f0000000240)=@known='system.posix_acl_default\x00') dup3(r0, r2, 0x0) 12:56:12 executing program 4: 12:56:12 executing program 3: [ 153.941659] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 12:56:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001000)=@filter={'filter\x00', 0xe, 0x4, 0xa90, 0x0, 0x0, 0x0, 0x98, 0x178, 0x240, 0x9f8, 0x9f8, 0x9f8, 0x240, 0x4, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, '\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x850, 0x898, 0x0, {}, [@common=@unspec=@u32={{0x7e0, 'u32\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote, 'veth0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x455) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa], 0x87}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x19401, 0x0) 12:56:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = signalfd(r0, &(0x7f00000000c0)={[0xd6b2]}, 0x8) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x8) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fchdir(r3) r4 = open(&(0x7f0000000140)='./file0\x00', 0x901c41, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000040), 0xfe80) dup3(r5, r6, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0x0, r4}) 12:56:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x4}]}, @IPSET_ATTR_REVISION={0x5}]}, 0x58}}, 0x0) 12:56:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) [ 154.116606] x_tables: duplicate underflow at hook 2 12:56:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000f8020000d0010000d0010000d001000000000000000000006002000060020000600200006002000060020000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006801d0010000000000000000000000000000000000000000f800726563656e74000000000000000000000000000000000000000000000000000000000000000001f472797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000680043540000000000000000000000000000000000000000000000000000000203000000000000000000000000000020c93f9800000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4ff00000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x14123f2dc6a8be1, 0x0) 12:56:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) [ 154.231832] x_tables: duplicate underflow at hook 3 12:56:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x300, 0x0, 0xd8, 0xd8, 0x0, 0xd8, 0x230, 0x268, 0x268, 0x230, 0x268, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x360) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 154.260109] x_tables: duplicate underflow at hook 3 [ 154.335243] Cannot find add_set index 0 as target 12:56:13 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.max.descendants\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x8001) 12:56:13 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) flistxattr(r1, &(0x7f0000000200)=""/4096, 0x1000) 12:56:13 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8}}, @IPSET_ATTR_CIDR={0x5}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x64}}, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 12:56:13 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:13 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x129, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c2000000810000000800490005"], 0x0) [ 154.848109] ================================================================================ [ 154.856884] UBSAN: Undefined behaviour in net/netfilter/ipset/ip_set_hash_gen.h:125:6 [ 154.864888] shift exponent 32 is too large for 32-bit type 'unsigned int' [ 154.871830] CPU: 1 PID: 8239 Comm: syz-executor.5 Not tainted 4.19.148-syzkaller #0 [ 154.879625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.888983] Call Trace: [ 154.891579] dump_stack+0x22c/0x33e 12:56:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001000)=@filter={'filter\x00', 0xe, 0x4, 0xa90, 0x0, 0x0, 0x0, 0x98, 0x178, 0x240, 0x9f8, 0x9f8, 0x9f8, 0x240, 0x4, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, '\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x850, 0x898, 0x0, {}, [@common=@unspec=@u32={{0x7e0, 'u32\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote, 'veth0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x455) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa], 0x87}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x19401, 0x0) 12:56:13 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x80d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 154.895222] ubsan_epilogue+0xe/0x3a [ 154.898944] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 154.905100] ? hash_netnet_create+0x366/0xa4d [ 154.909603] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 154.914628] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 154.919524] hash_netnet_create.cold+0x1a/0x22 [ 154.924118] ? hash_netnet4_add+0x2690/0x2690 [ 154.928622] ip_set_create+0x70e/0x1380 [ 154.934344] ? __find_set_type_get+0x450/0x450 [ 154.938963] ? lock_downgrade+0x750/0x750 [ 154.943128] ? __find_set_type_get+0x450/0x450 [ 154.947743] nfnetlink_rcv_msg+0xeff/0x1210 [ 154.952350] ? nfnetlink_net_init+0x170/0x170 [ 154.956863] ? avc_has_extended_perms+0x1020/0x1020 [ 154.961885] ? avc_has_extended_perms+0x1020/0x1020 [ 154.966908] ? __dev_queue_xmit+0x16e9/0x2ec0 [ 154.971417] ? mark_held_locks+0xa6/0xf0 [ 154.975595] ? __local_bh_enable_ip+0x159/0x2a0 [ 154.980291] ? cred_has_capability+0x162/0x2e0 [ 154.984882] ? cred_has_capability+0x1d9/0x2e0 [ 154.989482] ? selinux_inode_copy_up+0x180/0x180 [ 154.994253] ? selinux_inode_copy_up+0x180/0x180 [ 154.999026] netlink_rcv_skb+0x160/0x440 [ 155.003100] ? nfnetlink_net_init+0x170/0x170 [ 155.007606] ? netlink_ack+0xae0/0xae0 [ 155.011519] ? ns_capable_common+0x117/0x140 [ 155.015985] nfnetlink_rcv+0x1b2/0x41b [ 155.020837] ? nfnetlink_rcv_batch+0x1710/0x1710 [ 155.025612] netlink_unicast+0x4d5/0x690 [ 155.029698] ? netlink_sendskb+0x110/0x110 [ 155.033949] netlink_sendmsg+0x717/0xcc0 [ 155.038025] ? nlmsg_notify+0x1a0/0x1a0 [ 155.042017] ? nlmsg_notify+0x1a0/0x1a0 [ 155.046007] sock_sendmsg+0xc7/0x130 [ 155.049733] sock_no_sendpage+0xf5/0x140 [ 155.053631] x_tables: duplicate underflow at hook 2 [ 155.053806] ? sk_page_frag_refill+0x1d0/0x1d0 [ 155.063506] ? pipe_lock+0x63/0x80 [ 155.067058] ? pipe_lock+0x63/0x80 [ 155.070613] ? sk_page_frag_refill+0x1d0/0x1d0 [ 155.075207] sock_sendpage+0xdf/0x140 [ 155.079024] pipe_to_sendpage+0x268/0x330 [ 155.083235] ? move_addr_to_kernel.part.0+0x110/0x110 [ 155.088457] ? direct_splice_actor+0x160/0x160 [ 155.090734] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 155.093044] ? splice_from_pipe_next.part.0+0x2d5/0x390 [ 155.093067] __splice_from_pipe+0x3af/0x820 [ 155.093084] ? direct_splice_actor+0x160/0x160 [ 155.093103] generic_splice_sendpage+0xd4/0x140 [ 155.103272] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 155.104996] ? __splice_from_pipe+0x820/0x820 [ 155.105021] ? security_file_permission+0x1c0/0x230 [ 155.105040] ? __splice_from_pipe+0x820/0x820 [ 155.105057] __se_sys_splice+0xf31/0x15f0 [ 155.125099] ? __se_sys_tee+0xa10/0xa10 [ 155.125117] ? trace_hardirqs_off_caller+0x69/0x210 [ 155.125134] ? do_syscall_64+0x21/0x670 [ 155.125153] do_syscall_64+0xf9/0x670 [ 155.125171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 155.125182] RIP: 0033:0x45e179 [ 155.125197] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 155.125203] RSP: 002b:00007f89af9cdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 12:56:13 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$CHAR_RAW_PBSZGET(0xffffffffffffffff, 0x127b, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x3, 0x1, 0x101}, 0x14}}, 0x0) 12:56:13 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) read(r0, 0x0, 0x0) [ 155.125215] RAX: ffffffffffffffda RBX: 0000000000033ec0 RCX: 000000000045e179 [ 155.125223] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 155.125231] RBP: 000000000118cf98 R08: 0000000100000000 R09: 0000000000000000 [ 155.125240] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118cf4c [ 155.125249] R13: 00007fff4f6e363f R14: 00007f89af9ce9c0 R15: 000000000118cf4c [ 155.125270] ================================================================================ [ 155.278383] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:56:13 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x880c1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @dev}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040), 0x4) 12:56:13 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x288, 0x0, 0xd8, 0xd8, 0xc8, 0xd8, 0x1b8, 0x268, 0x268, 0x1b8, 0x268, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@remote, @loopback, [], [], 'wlan0\x00', 'erspan0\x00'}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'caif0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 12:56:13 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x11011, r0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000006000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 155.536419] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 12:56:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000f8020000d0010000d0010000d001000000000000000000006002000060020000600200006002000060020000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006801d0010000000000000000000000000000000000000000f800726563656e74000000000000000000000000000000000000000000000000000000000000000001f472797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000680043540000000000000000000000000000000000000000000000000000000203000000000000000000000000000020c93f9800000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4ff00000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r3, &(0x7f0000000040), 0x14123f2dc6a8be1, 0x0) 12:56:13 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400203) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00') unlinkat(r3, &(0x7f0000000080)='./file0\x00', 0x0) 12:56:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f00000001c0)='0', 0x1}], 0x1) [ 155.702200] x_tables: duplicate underflow at hook 3 12:56:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000060601"], 0x14}}, 0x0) 12:56:14 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000ba28000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028b2accb671dfb7960305d6e5c22973a37bcd3b98e6824bdd97f848cff23b8d3f2469d1aaf92ef4477fdc1b9dd4c2d338a04de566d1b5b3cb808321371cd4c8a467a4173aba8d8e556bf96cd82fb430135b486750ff8a4d435b66cfc7d8c013c15ad457244194470a92e32b0deee20795ab9735db0f1b736c075be41259fb3fba18fa6ed89a196bede3bff516e9a2d1b3f"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:14 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001000)=@filter={'filter\x00', 0xe, 0x4, 0xa90, 0x0, 0x0, 0x0, 0x98, 0x178, 0x240, 0x9f8, 0x9f8, 0x9f8, 0x240, 0x4, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, '\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0x850, 0x898, 0x0, {}, [@common=@unspec=@u32={{0x7e0, 'u32\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote, 'veth0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x455) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x80, 0x0, 0x0, 0xa], 0x87}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x19401, 0x0) 12:56:14 executing program 2: ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000002c0)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x10, 0x3, 0x0) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000220044944eeba71a4976e252922cb18f032e2aba000000012e0b3836005404b0e0301a4ce875f2e3b15f163ee340b7c59500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000000000004974000000000000097fc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e00f11987addce8e4240669d92c8633", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x84ffde, 0x0) 12:56:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x4, 0x2a0, 0x0, 0x98, 0x130, 0x130, 0x98, 0x238, 0x208, 0x208, 0x208, 0x238, 0x4, 0x0, {[{{@ip={@empty, @multicast1, 0x0, 0x0, 'rose0\x00', 'wg2\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x5]}}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000007fc0), 0x400024d, 0x0) 12:56:14 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000ba28000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028b2accb671dfb7960305d6e5c22973a37bcd3b98e6824bdd97f848cff23b8d3f2469d1aaf92ef4477fdc1b9dd4c2d338a04de566d1b5b3cb808321371cd4c8a467a4173aba8d8e556bf96cd82fb430135b486750ff8a4d435b66cfc7d8c013c15ad457244194470a92e32b0deee20795ab9735db0f1b736c075be41259fb3fba18fa6ed89a196bede3bff516e9a2d1b3f"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) [ 155.892094] x_tables: duplicate underflow at hook 2 [ 155.901514] x_tables: duplicate underflow at hook 2 12:56:14 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup(r2) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) 12:56:14 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:14 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup(r2) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:14 executing program 4: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=0x1, 0xffffffffffffffac) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x8000005, 0x4) splice(r0, 0x0, r2, 0x0, 0x422, 0x0) 12:56:14 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000ba28000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028b2accb671dfb7960305d6e5c22973a37bcd3b98e6824bdd97f848cff23b8d3f2469d1aaf92ef4477fdc1b9dd4c2d338a04de566d1b5b3cb808321371cd4c8a467a4173aba8d8e556bf96cd82fb430135b486750ff8a4d435b66cfc7d8c013c15ad457244194470a92e32b0deee20795ab9735db0f1b736c075be41259fb3fba18fa6ed89a196bede3bff516e9a2d1b3f"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:14 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup(r2) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:14 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) [ 156.541114] x_tables: duplicate underflow at hook 2 12:56:15 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4004001) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x24002da8) 12:56:15 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x1a, &(0x7f0000000040)={&(0x7f0000000180)=@newqdisc={0x4c, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x1c, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10, 0x0, 0x1}}, @TCA_GRED_LIMIT={0x8}]}}]}, 0x4c}}, 0x0) 12:56:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff028}, {0x6}]}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 12:56:15 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:15 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x44, 0xa, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PACKETS={0xc}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}}, 0x0) 12:56:15 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = dup2(r1, r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000400)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000002b8, 0x0) 12:56:15 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) [ 156.951332] x_tables: duplicate underflow at hook 2 12:56:15 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x40400, 0x0, 0x0, 0x8, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@getsa={0x64, 0x12, 0x1, 0x70bd2d, 0x25dfdbff, {@in=@dev={0xac, 0x14, 0x14, 0x17}, 0x4d2, 0xa, 0x2b}, [@mark={0xc, 0x15, {0x350759, 0x3f}}, @address_filter={0x28, 0x1a, {@in6=@private0={0xfc, 0x0, [], 0x1}, @in=@multicast1, 0x0, 0x4, 0xf7}}, @XFRMA_SET_MARK={0x8, 0x1d, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004001) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x24002da8) 12:56:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) setxattr$system_posix_acl(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x3}, [{0x2, 0x7}], {0x4, 0x5}, [{0x8, 0x2}, {0x8, 0x6}, {0x8, 0x5}, {0x8, 0x7}, {}, {0x8, 0x5}, {}, {0x8, 0x2}], {0x10, 0x4}, {0x20, 0x7}}, 0x6c, 0x2) 12:56:15 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:15 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000ba28000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028b2accb671dfb7960305d6e5c22973a37bcd3b98e6824bdd97f848cff23b8d3f2469d1aaf92ef4477fdc1b9dd4c2d338a04de566d1b5b3cb808321371cd4c8a467a4173aba8d8e556bf96cd82fb430135b486750ff8a4d435b66cfc7d8c013c15ad457244194470a92e32b0deee20795ab9735db0f1b736c075be41259fb3fba18fa6ed89a196bede3bff516e9a2d1b3f"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3108900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/219, 0x1a, 0xdb, 0x8}, 0x20) 12:56:15 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) read$alg(r0, &(0x7f0000000080)=""/40, 0x28) 12:56:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5412, &(0x7f0000000040)=0x15) 12:56:15 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:15 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000ba28000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028b2accb671dfb7960305d6e5c22973a37bcd3b98e6824bdd97f848cff23b8d3f2469d1aaf92ef4477fdc1b9dd4c2d338a04de566d1b5b3cb808321371cd4c8a467a4173aba8d8e556bf96cd82fb430135b486750ff8a4d435b66cfc7d8c013c15ad457244194470a92e32b0deee20795ab9735db0f1b736c075be41259fb3fba18fa6ed89a196bede3bff516e9a2d1b3f"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x24}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="020300002200000025bd700000000000030006000000000002000000e0000009000000000000000002000100000000000000000000000000030005000000000002000000e00000010000000000000000180018000506b1"], 0x110}}, 0x0) 12:56:15 executing program 4: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:56:15 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:15 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:15 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x1a, &(0x7f0000000040)={&(0x7f0000000180)=@newqdisc={0x4c, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x1c, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10}}, @TCA_GRED_LIMIT={0x8}]}}]}, 0x4c}}, 0x0) [ 157.513508] x_tables: duplicate underflow at hook 2 12:56:15 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:15 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in6=@ipv4={[], [], @local}, 0x4e23, 0x8, 0x0, 0x3ff, 0x0, 0x0, 0xe0, 0x0, 0x0, r1}, {0x8, 0x4, 0x94, 0x1f, 0x10000}, {0x5, 0x0, 0x0, 0x3ff}, 0x1, 0x6e6bbb, 0x0, 0x1, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in6=@private2={0xfc, 0x2, [], 0x1}, 0x0, 0x0, 0x1, 0x6, 0x1f, 0x22a2}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 12:56:15 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:16 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x1e, 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, &(0x7f0000000200), 0x0) 12:56:16 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:16 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:16 executing program 4: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:56:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0, 0x0) 12:56:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0, 0x0) 12:56:18 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:18 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:18 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)={0x2}) ptrace(0xffffffffffffffff, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0xb8) 12:56:18 executing program 4: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:56:19 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395", 0x34}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 12:56:19 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0, 0x0) 12:56:19 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:19 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:19 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r0 = getpid() getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x6}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r1, 0x1, 0x20}, &(0x7f0000000180)=0xc) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r0, 0x16, &(0x7f0000000100)={0x2}) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xb8) 12:56:19 executing program 4: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:56:19 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:19 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:19 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, 0x0, 0x10) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)=[&(0x7f00000000c0)='g]B\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\xda@\xc7-\x93\xbc4.C\f\x193\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`\xe2qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb'], &(0x7f0000000680)=[&(0x7f00000005c0)='(\x00', &(0x7f0000000880)='g]B\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\xda@\xc7-\x93\xbc4.C\f\x193\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`\xe2qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb', &(0x7f0000000d40)='g]B\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\xda@\xc7-\x93\xbc4.C\f\x193\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`\xe2qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb', &(0x7f0000001200)='g]B\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\xda@\xc7-\x93\xbc4.C\f\x193\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`\xe2qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb', &(0x7f0000000600)='[%\x00', &(0x7f00000016c0)='g]B\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\xda@\xc7-\x93\xbc4.C\f\x193\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`\xe2qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb', &(0x7f0000000640)='\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r2, r0) clone(0x2000000022040380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000840)=[&(0x7f00000027c0)='g]B\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=\x01\x00\x00\x00\x00\x00\x00\x00\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\xda@\xc7-\x93\xbc4.C\f\x193\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\x95x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`\xe2qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\xfb\xb9gy\xfd(T\xbd1\xadR^\x06\xe0\xf7%\x16}\xc8\vT\x92Z\x89\x89/\x17\xa5\x9c\xa2E1M\xa4r\xefw\xc5if-\xf8\x8f\xa69\x8bf\xe9\x91\xd3\x15\xf1\xf7\xf7\xc2\xb4\xc2\xb8 \x12\xa1C\x03\xc5\xe1\xde\xc5\xd3\x85\x0f\x83\xbc\x91{S\x19\xee\xbf\xf5\x11\x1a\xec\xed\xe0?JR\x90@l\xe3\x8c\xda\x1c\xfa\xec2Km\xf7/\x9a\xfa\xdc\x04\xf4\xf0o\xdfS*$\xc3!r\xe6*n\xf4i\"\x95\xdc\xa9\x96Y\xd5\x9b6Op\x1d\x8f\xae%\xd8\xb7\xea\xcb\xc6KM6\x01\xd5{\xdaG\\\x959\xb6\xa8\xbd\xfc\x14nQ\xe3\\u*\xa6\'r\x85\xf3h\xfdn=\xa9\x8d8\xcc4Q}\x97\xabg\x15L\n\x8f\x92\xbe\x8a\xa9y\xa1\xf2\xd0:\xa2\x0e\xb6#x-j\xbc+\xf7\xb7:g\x11\x1b\xa4\xa90xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:19 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238", 0x20}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 12:56:22 executing program 4: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 12:56:22 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in6=@ipv4={[], [], @local}, 0x4e23, 0x8, 0x0, 0x3ff, 0x0, 0x0, 0xe0, 0x0, 0x0, r1}, {0x8, 0x4, 0x94, 0x1f, 0x10000}, {0x5, 0x6, 0x0, 0x3ff}, 0x1, 0x6e6bbb, 0x0, 0x1, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in6=@private2={0xfc, 0x2, [], 0x1}, 0x0, 0x0, 0x1, 0x6, 0x1f, 0x22a2}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) 12:56:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r0 = getpid() getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x6}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r1, 0x1, 0x20}, &(0x7f0000000180)=0xc) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r0, 0x16, &(0x7f0000000100)={0x2}) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xb8) 12:56:22 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:22 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:22 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:22 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0xe0, 0x0, 0x0, r0}, {0x8, 0x4, 0x94, 0x1f, 0x10000}, {0x5, 0x6, 0x0, 0x3ff}, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@mcast1}, 0x0, @in6=@private2={0xfc, 0x2, [], 0x1}, 0x0, 0x0, 0x1, 0x6, 0x1f, 0x22a2}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0xb83, 0x0) 12:56:22 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() r3 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1c2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$getregset(0x4205, r2, 0x2, &(0x7f00000005c0)={0x0, 0x30}) 12:56:22 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:56:22 executing program 4: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 12:56:22 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x58}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)