57671c8aef8c5ffceb05a540e1fde0117ab998cf10d8bd4b4b0cf8fc19", 0xd0}, {&(0x7f0000002080)="b357e55f6ebe388cadb63be3c49f34323a9ad8fd58e153a36949a0ee", 0x1c}, {&(0x7f00000020c0)="f309285c7f1bb5ec9044ce15a14981dbe4452e0a0834b71d34e893b2d4e3f295390d1f7dcfc1c30ce99119d247d8299386cb19a9885478db420bca88234b32e8bf1ab6dc2c87f74438864b1d93579a4cb2a344b4769e6853d08443c967515b4bd9a7a06cdcaaf1efba9b9d170ad5d59fcf63c2e79394887a1261b97c2b66f64e0889e9168cb6c3334fc05181d64d238915b4c33a2a2f6c8b", 0x98}, {&(0x7f0000002180)="6467dcf5b6bab8bfabce9d3e251becc88390b9766722a7dcd5", 0x19}], 0x5, &(0x7f0000002240)=[{0x30, 0x10b, 0x24a, "c21bb3f8304c92812cebb90305fa6cdd832b29b7f93e2f47d0e4ea716f33"}, {0xd0, 0x6, 0xfffff000, "0c635f0e6b035334e6a91cfde677122603bf90943c15cc1d32eeb0c2288b8f5f41cb565a345b7d44872b32c0f67358942d7412a53f5ac0915494b9dd10fd10498332b2ddcfa4f9bbc2d79b5f9f9c56952b6a232bc8d2126005a17b0823f410406078b02f80c12ec752a2ccd7ae3c505b7b689829a999f6faa1a86f215f99ecf41d35b7858cd28a77028213262102550ca0c6a9cdc146a8ac0a89e4837fc98f0ed33d272f3e31693e5d4b7856d59c35a542c8e48ffc1ceccbe36917187a5f8c27"}, {0x88, 0x1, 0x8, "360b5b4ce2ca311bac8e02e49aa35fa624b035fb1529e404d17b2cfec5d304845410455a92a31e389587072ca3f58c8b277389626b12c3a95c76f130baa42baba6a0c57b1aadc316e43a68687a5834911040696a6dae7821a9106f91319a227f79c050f489ab8a993273e424e8dc417331d701d77138a6a7"}, {0x40, 0x3a, 0x40, "40c965378a973d3d6332486f8ed643643c8ac76604fc2820b465036eea1bf63475a83469a00daf9c761b"}], 0x1c8}}, {{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000002440)="bd2c40c196a331dd51132e8a3c22f5428b822e2b5434544d969661939be66dfa2be9936be0525615be84ef15546ca6cbfc77cdeef4045cc628ad77e49796ea2d368258e60d99059b85409b68ace080ccbad70189fc8c849e83698e1e164e153022829995dd9421976d15b6c05fa0db9bf164326deee708e2c1f822c4d6d5e6927e1bb8d2fbd0b136992e088fa58cda665821cc7b6808458e6edfbf18732a317ff281cf6bf2b92f36ec6ddd246d1bbe279862d2791fc7d38b4429cb6e12fbed3bae8cb085060ff6104d9fd580a278a8e5c2e3a7d9b4e3048eada38f3a770a307beb4c2cc446f69a907249db646d744e568b3f4957fa4111", 0xf7}, {&(0x7f0000002540)="54b43113a78693b7748ac4d5682ce1fd468a576855d08ceaa05366d5fef16fa5a7e8684d20068b0fb4e00823d94e09586dfcf33a83c48f5754b797a8256876c3256b1e7860b70b5cf07e1e74c58a8d7b5043bc46d23b88b2eaf110b733fc9527e90b890b7a6dc1d80db90e885f0e1686eba24538506b3dc24843629edaca44779f9a44df696ba9c5a1599d2c1971201f449b1bab711c38c0e39d62f7ed9e017c981fa81feb668d397ded235c9abe62f158f623ce771449239d7cf9f59dc9d94b1402d5a216d3517d66a3f54bc5985e49ad1f7f58567fdfccc5450c0d3c9a05da2bfcf32bdb13", 0xe6}, {&(0x7f0000002640)="0450a613be32d94e36da3c864b28af6211ffaf5e15e8a6daeca5d6dfbc050360f3686ad3428f6066ce74810730311e50a6fea9f9500822717761593fc7093292ceffdb24316f4c46489a427760d0f1473e7846613c8051c8fcd3379ebf4e57bd58b3bfc8dace7932108715add65f40c6918bcd113ba5e512c225353e9067c97380944195840fc3b1252e7f4e", 0x8c}], 0x3, &(0x7f0000002740)=[{0x48, 0x10a, 0x77d, "7c54d12e2895b9b4994e348cf306ebaa65e276b4955ef9f2421f9703db3105d8a89f91a7f137689272de9de444ff29eca63e8f"}, {0x20, 0x105, 0x101, "1a8d0adf8f0c73a2b13e083783ea548b"}, {0xd0, 0xf04a808122028195, 0x3e4, "43d5c90d6ad089ce923334c401f50c9634829ef2f1c2600bbb78cdf71a55ca2ee54a83c6cb470763fe781ed77d80ba3bf5186c5bcf79ca61bdb6bde1a357b6f5b947f0dda213f0093e02aab10b46b20369d1d5fe86bd53cbbd63adfcb58d3513d6d4855cb63571228d2afe98aeb89ac4b407c0232d63232e9b408dd4cb8a66f3f9f239ec6f6a2a7b05ca7b071dd95692330429b7ac19724e85da15a3d00b85c7b1e04e12740dc10c77c2d4a888c5d1bb212a5c749fab6b67a2b5c1d3f4d2"}, {0x18, 0x107, 0x9, '@a['}, {0xc0, 0x0, 0x1, "6e507996ae7e4b48d102d9b510a3139454a695a43d5cdf261c19ebe5d2827e2951530c1ce7cdd9dd8881a46f4ea6d51c2a2f668324957e3502b8035c4552612d13f074351f6db1b12451a6549773f6e81491d71f059c6a73134a68f8be9697c8a0ea1e374ff5857a72cc80d454611a7a4fd220e09d838227b064f28fbf221bda963fcb1c368837b55cecc5c29cab233560f9d917e5120f0db53c9329bf7b60495b0c50de922e5f8b16"}], 0x210}}, {{&(0x7f0000002a40)=@ll={0x11, 0x275f12a27e50e0bf, r5, 0x1, 0x9, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xa4273f1201afe5f6}}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002ac0)="ef82e4d7ebef3058d87282095951ea9f560d83163392ffe72425250620731f73f1234b2f604e0f301bedbc829ec209c0c3a46f0d24aa501179f6c83497198c983a078a8170d26921a4db71c18bba0bc45e54cb86240dfa2fe8256dbdbe2bc05c6a00bcf61aaf596ddc24e8a728b07e6ad60ac0627adb42616807bcd93b9ad194d780d1e7d6024b1b625912988bb74febd4da13be1a4c2ee53c473e8c623bac3ac298a6f38dfc685c0c0aea8e0bd26d2a4a5bfb895baa3d2b88f5267bc04f0a5603cec6d5cfa2e7cac804f62e00b6737fe4fc0c", 0xd3}, {&(0x7f0000002bc0)="036f22a6e0e5df9660f61d4093fe44c3669d8bde4cd773b24041d7f8123cb9496dddcb21ce18621d909a65fa161cb99da3f48cd0a27abd801bf90fe11feabc05d47ceb95c19e9e2901d65ff040c2e0a4c11a3f53b216f6bb3ae8e38a587d732c12c9e5e951e9e0d97217972de8954baef5f1d721980228904f7ff8f84eb297518db3d404d0dd1e0c0873640da82d47bdc242e98457692dcacff9702595476b6221bc7aca1a60ca5546a8a8913b152a7e6b164b2d76c907e2", 0xb8}], 0x2, &(0x7f0000002cc0)=[{0xf8, 0x3a, 0x9, "e5b3eada9ff908474910b927547cb9839a34ce81cc944753aed96edfd743e853ff77f1c280f010cf41e96c851d9ed101c8737d653348d5d52ca471200b6fd4621870d1277f52325b4489536fe93d036e683bcf7f759d7fb28aae5c32c1cdd801ef460eb0e248c2055a84346c2e71c1f499051db2eef0ccc8fb70c4d0fac1aed003689766a466a38a5d2b1154a86781bf6caa354556a2e5f99246f26c3974163c4220601cdd365410b1558468b7cd3bb6aada3a157e248b7d59a3725a077ac9b1fb11c6633e02dcd039a1c8a96626560e292e08ab5f81e824dcc046a4e7670e8a77"}, {0x90, 0x114, 0x1, "923da9374db922d3150a4c189f5fc07b8fe50d13610de3937a0689a7e6e9846aabeb712ab66ca0bfae38f4c48f6c560ae80f7ae97742c6f52aeccc513d6d5d32dbbcfc2c907cb0f65c998bb0724a1d2ccdee255aaa3c6245123db419bcab2eef8d8364826deecfc0bcfc5965f17691b839ab307c90d1a3e809420e"}, {0xc8, 0x0, 0x827, "39fa3d434b6004c25ff423973cb5e81074b6bdb7a1979e578e98feb8dcd0badc174aa073c640152f80774f48669e020b2b629736e43e56ac8ff818c1eeaff561a1f4d64991cafbc36133d99b5419c76bd57b783ba837f74767e6d71d446f7b2cc0731f21c68c3f754495fce7f5ad5330df0a50c1aa04818160e43b1a2580321734204c7639c922a7447826fa202d9295ebad3735aeea0eb56d6706a5168a9d321273fed75a7e3a121e80f04207d479a9321245"}, {0x68, 0x84, 0x7, "a40c96ee9b126198a9d07fee5686178c5ad2f79f052ac6c69dc98943181b9b24b21f2ec72fa22dcbbd3675854677456821d8aa60b604a0ae012fb80db665b417c5a025b49e8961f24cae66eefc271fb6dfff"}, {0x38, 0x10d, 0x3f, "60b0324e43bc8b92e44509bf63fe6d61d04da2e15b6a7dfbb850948518be7abeb1a26e8280"}, {0xc8, 0x108, 0x400, "34bea643e9b6dba315fe68f2d2f4cd3459367a59c647403718fcc7412995a721ac07e1d02616a97ef29e931eac17bb53a0e2988782f04954f1f6eebbd5fa775d45e04ff56a755c288f4d8a5e11b3dda5fb68a8131038b58e515d68bce830b8a0275101701450cf11fb46e47844d6ff6c36dd2408b3fb6979b21dcd01b5e01e492ff04a570c5768572d2463bc988dd4d0af2ee701ec1dc9268619586f502c7da807459a3450d789165027e160f7702db208"}, {0x98, 0x104, 0x7ff, "9fdcf6debacb1281efc7cf4f7f8a22eb28b89c67d55b1dbfda7e58a3619a7804587162c2f6458bf7d5483d13359642c780db4fa00e5fddb4cf6e714908ce30493b0a8f558b78c48e0d558947a953c83914382873e7f8a1812d013ba8d75e5d166a31831d69aa30167de8d7d6708a6040e27178db891e2c709addea94221e0b6df47e5a56ab0efb"}], 0x450}}], 0x6, 0x4000) perf_event_open(&(0x7f000001d000)={0x0, 0xffffffffffffff39, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) 19:50:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:41 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:41 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmmsg$inet(r1, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000600)="a8622ee195d489cda1b2bf1bbce488aa6c522d7f193add862ba521c8d82cd8dd67796722350ce3b7ef481ee6f9eb6cfaa7561c258b4582b206e2602ce7bf036bcc83fae94ddaede43a26222ffd23388b3ab509f9e48f3692307f6c8f57ed3f1fa2ca9764e9f053acb42c4b7fcc3c8fe001ab207f04337a8ec037a9690a582aceefb01d119df86ff02f956a5947aa6c5d02392d4d36dc893850a6aedf50bac694916c1f8804210fcb7aa222704dccb5be8d3bb494028b066d7dd26441", 0xbc}, {&(0x7f0000000140)="7f12ac27357a9cf5df114884691b250e4cb73cf12d55e9b24ee7c0f1dcad2dc4907662837cb9cb9c2472f4318afa8dc10515bf4e21c1d08377a8f432ed8315dbfc2ae75798a2abbcb4949d8dd8fbf7a43c04e6756378d79b09a9f053cd7a9a99", 0x60}, {&(0x7f00000006c0)="9c354e4a831990bafaac409dbbe533f0c01175fe45f7f017bb06de9a6c9afbe3fff483e85bede489ffcad717d68154a4596b73ad1bcf56b302ab4e2a94d36824492b18effc2a108ad5189d530cf7f42a7635ebd0c4ea96dc7ff2020f0842e728cf722fc16b2796b7a40fa72ee475afdc35b6d5ed8c746557b1be6bbc3ba3755d899ed7b151b505fc65159c7f133c3a00675306b65eded1191e6a94b870394fbeb489fdde6f981b7f34a95bea99824bc6e163bc3912ea22188fbfc12858377dbe8e5572b73aecc6e9eba3ef4655b6fde199a3d6a328f517f2f7a63361b2", 0xdd}], 0x3, &(0x7f00000007c0)=[@ip_tos_int={{0x14}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xbc}}], 0x90}}, {{&(0x7f0000000500)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000880)="897e9f4bd2e1816c60e975ec56ebabe4d5286eaac4ef9ec3073eb3220046fc4d32eb31acdf0c96b8c63f6b763dd47ee38285ef3ffc7bbc8215cebe90d7d4002596a46366f67527d03153ad44753073715b4dab41ce87b333b5c378dd6e0aaf99034d5bb8b174710af7e48ccfab9ab0f9a9c68290c3d1c79b8787aee2a34875587e576e2e0e438134718bbd03db9eb506d16551435a63130a1d98eaa6249871e56f3eb9bd776d30d0c4e93f0185b8893268d77e5c2b2a41808d72d7692e865b70aa0bc431fcf08a9375c93b5db6dae7231d699dc4e56f", 0xd6}, {&(0x7f0000000980)="624473e91f3fe0411a61a9950ff75890fdb8f0c364700dc47b8320323550a5b6203aa3a5bcdd06cf37b0e6d1a37968e482c5cb0021f2525a0638", 0x3a}, {&(0x7f00000009c0)="53759eebe303ae5c016a33f6e93e2e3c9793f5f5c2c9fdfc70e4a4ca8ddc6893a034459f3b631b7ad86459e6fdc7da0624add6e249582930ecdec2ccf2aeea0f06e2cbde934aff5b6364316dc3aa87c677caeebba1124a08059298f8d044139f58fb09c1bba4a52cee5453153930ac93287a9d33d5d87676b199a2aa6f5d2b39540c098929100fd392e07d0750210844f9ef8a109bfaaf678099b4e26d7a289f03e775d4906ee5fb6866681fad6ce8a09099314bdd94a4d1fbb9fa49e37682b1f586f88b65bb70f215e78a716f5322c440bcb6a4f7fde4226ffe95cb1740192e2b768d3958a38a45af37ee2837bd321d58683475e262fc", 0xf7}, {&(0x7f0000000ac0)="9424aa6821be6a635487710b21b61fd3ebfddcdc93de0e456d441e44b554e987c951858bb8b46853f68657a7275e99b7ed2808e31cc4c55752c336ab89e558e2bf5604535983f9cac4751edad51906765d6217c58f6c7b67cb40cbea36ab3f388ca017889925897f09a1dda1584756387dcaa4b050aa571e3b7538f978231070da425436ab68163d485cc3adad779c473e061165d35209865fb7ce", 0x9b}], 0x4}}, {{&(0x7f0000000bc0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f0000001ec0)=[{&(0x7f0000000c00)="ee9aa9fbcb01a33c0896f4122cebb0713eaf3b1720e02d80dc192a7a106878", 0x1f}, {&(0x7f0000000c40)="e56711b6", 0x4}, {&(0x7f0000000c80)="26f9e74cdcb5cab636cf5d55a04b1c965507df3c4e888fad49ffef5fcc3bde5c1478180f6d8462e7749ee5db0cdf10e9574de5a75956a658ab51e02c90e427e608d93d3d88c1c24b367648a8b2b80764f5352ba22bfb1a9aaf", 0x59}, {&(0x7f0000000d00)="af771a0b986c5e3271493b196c6a7c788d67dc6767ec271a6f3dd6f7d2ecdd4c89401efbc76b607c95cd00bce3e21952af4379473816722e75de46c431b97f74cb6adb9ec92bfb030ba70c44f0de9cbd76", 0x51}, {&(0x7f0000000d80)="51886957d70a2e3dcf15ed2091b5eddd9a555f1331b5fc75d935d464f301cef9a5e7765cf1d3cfe52186666a5414391209f09a7cb854aebe4696b3bc87a54868f6ea4827661b5c056629d94bf6b9a4f78db3cc2580c6a32a0e11eff13bc79e15ec0776ee9cfebd0fb025596df09afa8316efbc", 0x73}, {&(0x7f0000000e00)="b12fb13174c3f03a20d9c57ae038bcd96c03770dcf30b8a084e2e511482e8bcfd9584e324a6b924b5519fbef64aeaddbe4868bf22ceca0af9c2ad4f3cbf6ba6b1448c5269933aa52025fbbcf5b866a2e7b5971d59ef15aef64b9a103804cc4d75e9461364164bd9561d51b9b565e587260deca294f5e70f4f9ce30bfe0c4b30197fa2d85af05cb729239378018240befc3d109483160f4216339cb3447c05c2a63b23699da623e6b8a06e310b3c12bf64468f141011530de387939de741674796cf56ea18f0847f56d8069426e642168a5581665d129f5811e6b7967c58a7b9cc7c41ba371360ea3661b94d5f2d337e699f6349471a6c0d9082259db35a037bba779875ed85b5cfa9f58849ad7cc5dcab84cd9acfc76662c42b6ced7a6cce82e171c3e8f2eb05d387c9e0c5f21b0a67d89dd3eb54400fad4a57b13e33c406377921a56e948cd37bc46f231b4301a7e4a185e47b585666e88af16d8d3dfc80acd15f0f756b0aad16ad9bc0687aad9a36b300ae54262d248e57b6aaf58d8de1f1bbd965413d201177859ee035b620bbfce9c470727d65f7ce67d2aa695b3896d47082f3b85c1bec7d089ca25f34eb7fe3221369f14e664a35d675271448c498e2bb2284a0b93b059aa257090ac0de9f5ba3e9eaeed165b73229337ab6545790c2eac9636b223470249f56ff4e3be9c95aada97da09c302ebfb810071f3e82388335b732b08f964a88ed3ae0ad037267306a0c900eec82d70950ca9491e178f210b88ffe28d69841cae9539a116fe0ce744337d4518da246902300952d985a1774aa898ee2da77fc799e9928289d1d93f21864240af57386832405de1ed76dbe33079c98fbc7976a18f627490b80b9ca277d08cfec787684a554dbecd4fb636a97cc37e3c2faef51e9dfe775a130685ba04a2498981ff72b1b3a22de2ce521c77d416626da15b80b17f4639fa011c1db8e9a07904da771cae2b892bcda640128f5dc6836ce078a3f9053282edc8a2e4bbee097d51996904a5527856307070c1eb8cb56c235ef3e1cd065ccbb8c4895069cfffb6df671317696682c1a33ca41ac7f85d1130b56b026e7601651024b4141acd9b4cb42c1e2a43e0080d8c7ee6aca0e0fc0f6a8ff61023de1576ebb78338f8c7639f64b3b75e053a1a0fa066a17aa9ae094f21b74ee8c8d01dc4de44acbc871040dc2d5fd46759d0bc436eb72a0894e69a0da1190bb333078ac4f7b9bad3a59c7c53768c32dfa2e346314b3684f4cab9930f1b2c77e5a1c7f3591eee005cb3335902348030a8cac319125a96546afd4d1ff833d14e372ff8a5d4e113e8d16690325d17f308c90961951e0cd9c926eacdda97d0b485488787e790b27880e37ec067acc6cfb2c188756fe2dbc6a7c20079855e90239b817dfe417cb2927c2f8f87d4bd94f9bd70c84b3002616b4ef79771ff3b3ba025dbe7f230a8b4f1f3a34de92efc2517190e60d5c873a99c6e433fccf5e55748dd77d4695198b99968db66df7eaafc80ea6a33b715c0db30318f66a55d9a5288fbb9a7faa90ff35f0336258345e458e5ba3ae349d08fb8c76834efe2846be526c47cf52d7fc613a6de9d0f35b09afb6a467c4840b0d3e30f48dbde2e9c5fe1df104e8e381ce8474a436c39fe37d827f651e1e7d1d14632a38f77a75bcb4830db00f842b3569b9c2b70938b83905fa88a0ab66a6f5587c158efcc01e05ac119916aa9596cd525d718766b9dba5ad85f571ccf9ed445b4df68ae2a5f423ea4dc74c4d05f87eccaf5e24c62c7a2c30ee090964d341f2c244b05aff404a5ea425fef7a6fef0e842b037d8806e037eb0315b3bcd307711efe4ff5048300136d9adc9dba12149258b63b4c812a32494a467fc14c82c94cc08209295b53681c4ca209ef62b8708f82ce8565809a5e665b3c01659f64202abb4d4b9779cb2f82947699c4e828b0e5afe1b46cdb82028b2f38970350085dfe3a0c44f9527e7e0c441b2af27b6a5a5db69b8b664741a242cd0113983e1689a947bd4ee9c5ec1b434d599076de1ab10495af8bdf5f1788e738f8a8044359c9fff7c453c634047a26903279b33e3dbef4344c407c2b94697e34d04d4c710c8d9f9d215c5b0d402531ca7505d63cbe97922d63a3dfc5625db94473250d1d8e94789946614a4c49afe69bf6df2ec8c545d9f40e3834d615843603013567b984d0842c9105cda373d3bbcfbbb89afb445bef02d076cfd8824368c0336a8f5f43888374337ce30f82a3b7a8db6a1b42ca810bc973158659eadb3cd9e09cc65f2a03a192e439d35c180c5ea197dd2740875750d3703e3f3ac6b45d7eb98db2d348fd7959597e22b01b4ff7718680747b2571af97f3a6acd5b95efdb7409b155cae21701e91cbbcf6aee600dc1f890e52e51033b83a1c5220ea706127a63e4ab1c26482944d77f3134ffa0c521d1f6c81398648c50a6a3164443a2ac18c9cbf2f867d6ec8185c89580ac305dd15b05e9b0045aa88e56ca0c8463e5d0af26c56b8238f68d8600733576cbd2801754f25055f42eb143572d1ded8cc3f464380eae532359a61b6662700d8f6dff81d93a01012f0a6aa03aa7b38412e2d932e12d56a9918a1a4e13925f938c5820d9da72e60becb744d6a16c945d62566c5886b006876e9ad301478c47a5d90c57e38cf17354f3888cc9561c1da3d50f761b74a9afb47f9754e226543c23bda22f85b5748c5e7db552f95a5004ce2649a3ef148cdf745723231a01d01003dd5aa9fc030fecdcc3ea43ea3f74c575514413dde8529737210cc8004d2961d4f6c04d8c06b277262a8136448ba537615db2945ea217074de37c0550a04bcb0e2507e46ec7e18298ae4330a547ea3cbfb4d9106f0adee7424a98c67d6ce318ce4898cb69a694b7169282518633f664adf53f521a979927ecf5e39af67fca7d658ff5d72bff6bf27a3276ae7a23291bc6a572aaf456904ad9db28dc8065fb8bc5e73f8a398054e93022b450447c1fe8756f10af632aac4bdf43664bbaeb56313f5bcc05da5b634c6ad50ddbb68484fdafe9493c7b4a0889b06d36519d2620535aef81fb21a5245de5636fb46c5f23ec606a49b5662eab68c4d6b5089ac78b582f0990d75a80c8a9778503ba5462676ebdb7aaf8a3b869029d16dd0887777536563b3b6d81b05c5b1cbc2e43cbf430d5dd2adeabe66733e6f6fdc016ce26a6b6ec50d4cb0c65f9c95e68dcfb4fbb6da750ee007bfe101dac74bfb03c5d6117451b1fb29b08fffffd4855862c78429ef1bfd45b133f5e41a0ed5ecbc738f5752b645eca6134016facc041824441a9960eb1083c0ea0f7f2645a412f082432c8a9c806f353f60a40504f2473a7334a728fefbbb7dea10efbd72226a04a50b7a196b457ff27f4558b02400df4b9a2d7f933be0350303de8f9c66fb48b293218f4927d0de8cb15a54b19b8cac7d68c44e9b4763dc8c4ec4efbddff6f8dadd7febeb768b88b138fd914a7457c2b8ba9f76bd8ba8575f95e1a875018126804f1d0aa0d47ba1f9e85a52bcdf62593a66e9395191b55b146e23b5010daa401107a203064838f5a64516ae39264ac50c9712e3b74dd3604b3df89456e10718bf6fd1fcb7174bb97fc7efe0cea705ef39a6bc2368c966f3390735b97272e552d966991a463f87021d729e1c567db6e850042ee3cd68916f329034b08bd904c56d2e49d649423c8ec9ac6827a9b12ad81c4401e7f785e9117625ed4e192aae7faf114165330c88877217535b60279a488268e472c5f9bf3ba09cf8d8d67f83398fb296d456ec3b3da7c2fa9db7408e662f54c6b34cb37ffa8dd21a5e014f4e1a7584c77c0afaba5b7f24531383bf0b3cfc229e7e724267957fe4e2c24f3fabbc7d67700289b24868b4054c156e22525fe1e8986ce49f680f68ae88e2eec3b3c7730dc9ef6fff89d50d2fc168945843a687d7f9e0c90cecd34b0930cc3a86919a4fb90fc766a7e7e0d5f34a832ccf3142bd069648e89292fa43bb4e8009a015d677b11e1088cc7d1dcb540dfb6a3e34c98e98aaa67819ed72c083e5dd8cc659b854326f99519376de1ff8efd0467267d37968e5234c5823434dabae43eef4ac2d9df3557639a88112c20525ed239e821046333b3180315139bb68fb6e69351357bb12bf37290be5654ee1b2f3a4db97a87ea94bf7c06670fc28b64121e25b527ee87280504fcc23b43aee762063f497898da92bef7b05b6374590141186a62a10e2089db7e9b8c25a15c43c92e74f1ff657aae7033e69e74b6c9295e87c6a6b05f30378e194b57df4c0c202397e7a6f312f385b6536d2db1623d21f7f488b501e8307c2e55655959e0b489a7a4192494a55ef2fcd530efe4775b69cbf85adf5b292db11371c63338be29d0e0b606cf9503d61eb70a13d28928cee090f08157f46d0319bb0efb00e93b8d6321f03d68c654f671526e725f3c11b188c46b24d8a26434b659c3b9811a20b3d8c7deaf4e3e6d45a16be409f9bba1af8bf985f08f15b77e04e827008336fac598552eb201e635ce9f58ca0bb7a17f583913ecda8a105d6c780953afcf539a990ddead20d346fc2ea5978d638dd99da283c904a1173469bcf0e5ffc038d294e99eb753821eead78c77b63b0a8f363f60e9c13126b89aea9ee7f3def7aa78f0e672f4d280ad09a5ab9b6c59513b00bc6db210489cc95e5b5f7b46560f02d5b3b77e6a23f54c84d4122853428beeb1482ee0be9baed4ec6b1c5f2b9809c76b24dc1cb0ae2d80dd79b2a47f6d785739c396b80fcce13336d5d06505a702b1335c14d579e674cbb061dca1165bddc83599ce8a36da69570db1e5f2e7bcece05c8b5659cb815e390482cd9934d2fcd92555e5abe961d00ca5b97f26b9e8bbdbd670e28f329d694d17ff42186c69b5e7af4f39237111845d97296cb83472016999910e454d8b0347c1b6ebbeacded5d3f43e557d3ccde7e3ad26218609220584ba09fff155f2fcc22b97ad6008f904d3d48914a0755aa4b78a9bf37ffa56e960e4244a90141efaa130758f5e53fa35f76cf454f8812a87a89b90ddb0a0691b8c7eaf93dfb84f92055228ee1e72f6b162873ec4f896c486964aa56deda6fedea1800d9bf80f339d9e4a57099c8302268e8e244e3aa48744ddd00da140cdbab5579335f3ca5ff773e4463a5b86c872c4c413708e0cca029b76b3e0ddfaf68bb527b8ea23763e4ffefdfc6ca4e2c828acc167b7f512421660b9622233d11b0b0635875f36c651e02165007bc83630ddcb34f49561837fc3e55dba2b190d27676aaf132cb26b13be8a5ab28daacf26a6c13d8b4b29d2a06253a5bbf66d3582565ffff4b8071d4bec0c2650e2c78d7a032bc1266985e97756820289999c8587198c4bdeaa2179cf375c9aed493b5c4a060e8ae03c5d6e7cfea90afe9cfd98a1f3b98991f60233a5b1fddea4ba36753e13f6f52a11336cd45956c66f1f19d41e333f83f770dd7c4c18d3616dc72d1418b18e04d0e0e76d2925ec2888d93f0d6b8abcaf7f6497430d25245e837ba91d9a1ef5b60400f80412ecb0c23fa5a591ecc775aa87daeee820cf4f105ac609314d726a667fd7cae201dd24eb5918bbc07ad1e007f633d4b5b06fa73e2314d6b34e83524ff92e0746833323584ad0e0dded339efe91097aeb79f49f95cf86cc2f58f53f9048d1b6e9357d05980c9880827c03872dc8d1a4e5540eab6838899f92087f3f8555ea53f07f1bf8b1dfc019817625df024218f8b886e0939a01dbb208ef4cf12b8b17cd928b5384e3c44a017fce4b6f982bee8", 0x1000}, {&(0x7f0000001e00)="0366ab1da5b9a7787c7bdc7f7734f018d95aaf4c6404fa73398a0ff1a12896fc12b825e1c7f22dd1317140d1c2152d6f0d05e0d6137177af21262391b810b7c13d71cae182782f7a1821993d46d287d94ddbfef512c5976b5ab7465a7d0a053a4e212fb1db428989e3a0ce94cc385acb75599c5b8a3a0302c13ea640bcfda15af7b6f4262a54ed2a1506e3c446e893d054d874bd465a47", 0x97}], 0x7, &(0x7f0000001f40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x3ff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x10000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x82}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x6, 0x3f}, @noop, @generic={0x89, 0x12, "b01f4b18b48ab28d4fee5cde3f70bc4b"}, @generic={0x0, 0xc, "4b6d49ca0a5e0a080f93"}, @lsrr={0x83, 0x7, 0x0, [@multicast2]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x94}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0xd0}}, {{&(0x7f0000002040)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000003180)=[{&(0x7f0000002080)="1320d4d25f2611f0fddf0c787cc65cf04cf2b1db3e69dcc53ba42d304cf1a74f389efe1c3b51bfa92064c596ee5be2e85e08a238bbda748bd811d797cf2ae9679fdfa252ec5b99bb0c986b13b241f960802da6b63727a25d65a7d6", 0x5b}, {&(0x7f0000002100)="59914b509ba6b512214e1c25bd812317db6b91f9e7018c350e2dccc51ce30f4db5b78f90ff1c80438816010c98f40dfd2d3876bae6153c0f2f4f1ffb363a9eef67df10b43fec9471f48384470c65c7f8d5df737043d25c61", 0x58}, {&(0x7f0000002180)="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", 0x1000}], 0x3}}], 0x4, 0x0) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696ed15e2c66736e616d653d75736572637075736574282c61756469642c736d61636b66736861743d2c00"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000032c0)='/dev/urandom\x00', 0x400, 0x0) 19:50:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f], 0x0, 0x0, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f], 0x0, 0x0, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) [ 726.458252] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset*" or missing value 19:50:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x7, &(0x7f0000000a40)=[{&(0x7f0000000200)="95eab7e7b75a", 0x6, 0x7fff}, {&(0x7f0000000600)="f76e2de9a44a34011cb4cb10e534386a385333256e18c4f272c0d506e670ac56b36b933cb2f1f027278bbaccc52172d5ec29e1d8921d37ae77c83b89a0324443ed7e8bd5e3e2703e88e333939b999840d84e5197c10355c9f9180c3a19c636f4db1e170188956dcd8645c97b58f7ed33c73c02feddeb23d0f45f8af09f08e44734fe6a6787efc5400572208b4ebfc4a9c710166914aae9", 0x97, 0x2}, {&(0x7f00000006c0)="29c67406682c910f5f2d9b7e8442ffddd41f0e56cfb66a5ec32edaddb8c998a2d09ddcbb18edd5e62e1cee6862803ea1d47ca7c26423297ccac14cbd60c1a63fcc659ec909149d85af3880b45713d7ff50637133d6617a204169cf9647b802da9c7f7027a255f73655b7996abecd140bc3fca963aeeec34df47d9267c2d9e37493662275b00366c79f3fbc0a9dd01a0bfa371f39e31d2c7ee1f84b4cde43946e0f08a221d6a273cece0d6c4835c3d487293f3c6226", 0xb5, 0x7}, {&(0x7f0000000500)="fa31578e9c2408af84b5a5c95ddf91b87c490ca64c1ca4cc9f005c496c39bfc79c", 0x21, 0x7f}, {&(0x7f0000000780)="e08c71680a7fd31c80676b6f2bae49efac32e6ffe59d7ea205aa5ef8a86b197b9bb6f882f8cab4b87ab107c1765301c786499fafecb0ab87c28e4548aa8d97e06bc2dc96d01943c294a880634ed3518259b74d6331c9aa3510c49cba6be729f4a70d3025bf2fbeb5a97722c1fda13deae0c24bacaa1d61779bfc9050dfda88fa8844929076cede19e089b6c8cd", 0x8d, 0x10001}, {&(0x7f0000000840)="4015887b10a89062e58e15431c0db6145b2da51d35dc2abeef919d55d073e6cee350b4f8882912d898dfe0882b0c9a0f4338c2777b159d8dd9be5acd4930405de2bd78be1f21ad6a4bca57928ff8823a32df6690f9d5783bd5f3ce69bccf9f66be63bab8fdff87370851f24c7194c57a9462df9d6ec4e8c65321aa173ae8314508734fc4aa59eeb6842dd21c716ee31830193b9dea3746fa02da7ef07ff19b0504cd7fb1a6e3e08e558a5df41726f5b52b037eafc10d84ac8b74cb8e93d1f55b09e2ca79f0b561b93ad8711ff853d65155f8f4d56e64cb81503e9f90b7d4dbda123c6b", 0xe3, 0x7}, {&(0x7f0000000940)="fa40f0e72b2f5f61556f1b9ea7ae91f3594c726d6d2f9777bcb1269384e68a4d54f7a6f44038637fb75df8b76af5860e0ae00569cb16d5016c7182d3a633d38d164c8e50273ee2bb4f045cf95de83a130022f2faa2e2c746135ff7eb3c3fe2d1f4b084e29aff2af6c83bbac8855c590f174c10226044131554f9f71c4b283f3bba6ea878d93d36d96eb4f01d396a5534d0d345bde0a4be28d0eea510e5bf68c6f07824a6316609dcfb7904e6bb14c2e2bbaeeae090dd4a87a8d8c2f3e6cbafa7a4dbcf10a9174e1074cccd4ab07f", 0xce, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYBLOB="e8d1e2f5980273e1cb24c6fc729cad1f872490ff7b69552327c9714e0dfe48d12886db2c4d2c50cb7392cf821e49d556ba6704e594b981e02680cf193881f36acc3ac149c39c79e199ef09d3a712d8b2e3de7d2e"], @ANYRES32=r3, @ANYRESDEC=r4]]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) [ 727.444399] FAT-fs (loop3): invalid media value (0x59) [ 727.480536] FAT-fs (loop3): Can't find a valid FAT filesystem 19:50:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB="73686f721f0662241f0bb5456e6e742c667351616ddf3d6c003df79d75736572637075810574282c6175646964ac736d61636b667368"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, 0x0, 0x0, 0x80) getsockname$inet(r3, &(0x7f0000000200)={0x2, 0x0, @empty}, &(0x7f0000000500)=0x10) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r4, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @local}, {0x6, @remote}, 0x4, {0x2, 0x4e22, @rand_addr=0x4}, 'veth1_to_bond\x00'}) socket(0x0, 0x2, 0x0) 19:50:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x618, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x678) 19:50:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) [ 728.179179] FAT-fs (loop3): invalid media value (0x59) [ 728.214364] FAT-fs (loop3): Can't find a valid FAT filesystem 19:50:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) [ 728.379580] FAT-fs (loop3): Unrecognized mount option "shorb$ µEnnt" or missing value 19:50:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r3, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000000)={0x40, 0xffffffffffffff7f}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x503000, 0x38) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f00000002c0)=[0x7fffffff, 0x7d3]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x80000, 0xfc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="28000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000fe880000000000000000000000000001fe88e7b9b9040000000000000000000100"/188]}) syz_mount_image$vfat(&(0x7f0000000100)='\xfffat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914abd9fcb9ff704a8f5199f30cab02d2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270c", 0xcd, 0x401}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x4800890, &(0x7f0000000140)=ANY=[]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x2, 0x1, 0x0) 19:50:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x618, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x678) 19:50:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x0, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x0, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x0, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000140)={0xffffff97, 0xf53, 0x1ff, 0x3}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) flistxattr(r0, &(0x7f0000000000)=""/7, 0x7) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getresuid(&(0x7f0000000180)=0x0, &(0x7f0000000200), &(0x7f0000000500)) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r6, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000700)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffd, 0x201080, &(0x7f0000000740)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x5}}, {@allow_other='allow_other'}], [{@uid_eq={'uid', 0x3d, r7}}, {@smackfsroot={'smackfsroot', 0x3d, 'ppp0\xd4W'}}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) [ 729.868354] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x618, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x678) 19:50:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}) iopl(0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="28000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000fe88000000005b4b2325c798c23fbd00000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000022241afc6566436f9d86faa43c51feb4fa375e"]}) r5 = dup2(r3, r4) ioctl$EVIOCGABS2F(r5, 0x8018456f, &(0x7f0000000600)=""/224) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x618, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x678) 19:50:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x0, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r2, &(0x7f0000000700)=@ethernet={0x0, @local}, &(0x7f0000000500)=0x3f) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r5, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r7, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) r8 = open(&(0x7f0000000200)='./file1\x00', 0x400481, 0x34) r9 = getpgid(r4) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r10, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) sendmsg$DEVLINK_CMD_RELOAD(r5, &(0x7f00000006c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000280}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)={0x11c, r6, 0x504, 0x70bd27, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, 0xffffffffffffffff}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r7}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r8}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x2}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x3}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r10}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4000000}, 0x400001d) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f0000000600)=ANY=[@ANYBLOB="73686fec2be2f472746e0600000077696e6e742c66736e616d653d75736572637075736574282c106d6da98ed17e9761756469e42c736d61636b66736861743d2c00859ff13eb9f0c11f692fce29d700bd91d894faa1662ca9e1bc50902e3ddfc323d936e13b0290582dbf6caeb4fd5aa88ce553b0e16f1158c501a00c07804911bf7dfbf2339722a42addfd0ad67d63593a39c530ff6a18f583cadfe60fe3dfe28b68b792e0928742a1f4cb4d16ba131be8e23f0d2cb58d7c84fd78253ccc"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000140)={{0x2, 0x4e21, @empty}, {0x306}, 0x8, {0x2, 0x4e20, @broadcast}, 'ip6gre0\x00'}) 19:50:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x0, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) [ 731.382778] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x97}}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x13, 0xa, 0x9, &(0x7f0000000000)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r6, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/vga_arbiter\x00', 0x4a6440, 0x0) accept4$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14, 0x80800) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r8, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r10, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="28000000000000000000f000000000000000000001732079fd16706a05d799ffb10000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000fe880000000000000000fffffff90001fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000"]}) r11 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r11, 0x107, 0x1, &(0x7f00000000c0)={r12, 0x1, 0x6, @local}, 0x10) r13 = socket(0x100000000011, 0x2, 0x0) bind(r13, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r13, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r11, 0x107, 0x2, &(0x7f0000000000)={r14, 0x1, 0x6, @dev}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r10, 0x8933, &(0x7f0000000740)={'team0\x00', r14}) r16 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r16, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r16, 0x107, 0x1, &(0x7f00000000c0)={r17, 0x1, 0x6, @local}, 0x10) r18 = socket(0x100000000011, 0x2, 0x0) bind(r18, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r16, 0x107, 0x2, &(0x7f0000000000)={r19, 0x1, 0x6, @dev}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000a40)=0xe8) r21 = socket$nl_route(0x10, 0x3, 0x0) r22 = accept(0xffffffffffffffff, &(0x7f0000000b40)=@l2, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCETHTOOL(r22, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local, @empty, 0x7}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x0, @random="f982a6731f8a"}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r21, 0x8933, &(0x7f00000008c0)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000900)={0x0, @initdev, @dev}, &(0x7f0000000940)=0xc) r25 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r25, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r25, 0x107, 0x1, &(0x7f00000000c0)={r26, 0x1, 0x6, @local}, 0x10) r27 = socket(0x100000000011, 0x2, 0x0) bind(r27, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r27, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r25, 0x107, 0x2, &(0x7f0000000000)={r28, 0x1, 0x6, @dev}, 0x10) r29 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r29, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r29, 0x107, 0x1, &(0x7f00000000c0)={r30, 0x1, 0x6, @local}, 0x10) r31 = socket(0x100000000011, 0x2, 0x0) bind(r31, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r31, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r29, 0x107, 0x2, &(0x7f0000000000)={r32, 0x1, 0x6, @dev}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000006600)={'vcan0\x00', 0x0}) r34 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r34, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r34, 0x107, 0x1, &(0x7f00000000c0)={r35, 0x1, 0x6, @local}, 0x10) r36 = socket(0x100000000011, 0x2, 0x0) bind(r36, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r36, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r34, 0x107, 0x2, &(0x7f0000000000)={r37, 0x1, 0x6, @dev}, 0x10) r38 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r38, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="2800000000000000000000000000000000000000000000000000002aa7d4f93bba8700000000000000000000000000000000000000000000000000000000000000aaaaaaaaaaaa000000001200000000000000fe880000000000000000000000000001fe88000000000000000000000000000100"/179]}) r39 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r39, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r39, 0x107, 0x1, &(0x7f00000000c0)={r40, 0x1, 0x6, @local}, 0x10) r41 = socket(0x100000000011, 0x2, 0x0) bind(r41, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r41, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r39, 0x107, 0x2, &(0x7f0000000000)={r42, 0x1, 0x6, @dev}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r38, 0x8933, &(0x7f0000006640)={'vxcan0\x00', r42}) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000006680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000066c0)=0x14, 0x80000) r45 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r45, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r45, 0x107, 0x1, &(0x7f00000000c0)={r46, 0x1, 0x6, @local}, 0x10) r47 = socket(0x100000000011, 0x2, 0x0) bind(r47, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r47, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r45, 0x107, 0x2, &(0x7f0000000000)={r48, 0x1, 0x6, @dev}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000067c0)={0x0, @remote, @initdev}, &(0x7f0000006800)=0xc) getsockopt$inet6_mreq(r3, 0x29, 0x3f, &(0x7f0000006840)={@mcast2, 0x0}, &(0x7f0000006880)=0x14) r51 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r51, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r51, 0x107, 0x1, &(0x7f00000000c0)={r52, 0x1, 0x6, @local}, 0x10) r53 = socket(0x100000000011, 0x2, 0x0) bind(r53, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r53, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r51, 0x107, 0x2, &(0x7f0000000000)={r54, 0x1, 0x6, @dev}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000068c0)={{{@in6=@initdev, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000069c0)=0xe8) r56 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r56, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r56, 0x107, 0x1, &(0x7f00000000c0)={r57, 0x1, 0x6, @local}, 0x10) r58 = socket(0x100000000011, 0x2, 0x0) bind(r58, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r58, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r56, 0x107, 0x2, &(0x7f0000000000)={r59, 0x1, 0x6, @dev}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000006a00)={'team0\x00', r59}) r61 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r61, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r61, 0x107, 0x1, &(0x7f00000000c0)={r62, 0x1, 0x6, @local}, 0x10) r63 = socket(0x100000000011, 0x2, 0x0) bind(r63, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$packet_drop_memb(r61, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @dev}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006a40)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000006b40)=0xe8) r65 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r65, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r65, 0x107, 0x1, &(0x7f00000000c0)={r66, 0x1, 0x6, @local}, 0x10) r67 = socket(0x100000000011, 0x2, 0x0) bind(r67, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r67, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r65, 0x107, 0x2, &(0x7f0000000000)={r68, 0x1, 0x6, @dev}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r31, 0x29, 0x22, &(0x7f0000006b80)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000006c80)=0xe8) r70 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r70, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r70, 0x107, 0x1, &(0x7f00000000c0)={r71, 0x1, 0x6, @local}, 0x10) r72 = socket(0x100000000011, 0x2, 0x0) bind(r72, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r72, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r70, 0x107, 0x2, &(0x7f0000000000)={r73, 0x1, 0x6, @dev}, 0x10) r74 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r74, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r74, 0x107, 0x1, &(0x7f00000000c0)={r75, 0x1, 0x6, @local}, 0x10) r76 = socket(0x100000000011, 0x2, 0x0) bind(r76, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r76, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r74, 0x107, 0x2, &(0x7f0000000000)={r77, 0x1, 0x6, @dev}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000007800)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000401}, 0xc, &(0x7f00000077c0)={&(0x7f0000006cc0)=ANY=[@ANYBLOB="d80a0000", @ANYRES16=r5, @ANYBLOB="00012dbd7000fcdbdf250300000008000100", @ANYRES32=r7, @ANYBLOB="000102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040048060000080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="080007000000000008000100", @ANYRES32=r20, @ANYBLOB="b00102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r24, @ANYBLOB="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", @ANYRES32=r28, @ANYBLOB="c00002003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004006d02000008000600", @ANYRES32=r32, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000800000008000600", @ANYRES32=r33, @ANYBLOB="08000100", @ANYRES32=r37, @ANYBLOB="2802020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400018000004c00f100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000100200162110000ff0f810006000000ffff7f030900000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ffff000008000600", @ANYRES32=r43, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00017b348cf86efef6030003000000080004000400000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ff0100003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r44, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040060cf050040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004006838000008000600", @ANYRES32=r48, @ANYBLOB="08000100", @ANYRES32=r49, @ANYBLOB="b8000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000101000008000600", @ANYRES32=r50, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r54, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000800000008000100", @ANYRES32=r55, @ANYBLOB="7801020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r60, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000180000008000600", @ANYRES32, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000080000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040043040000080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r64, @ANYBLOB="080007000000000008000100", @ANYRES32=r68, @ANYBLOB="7c010200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000180000008000600", @ANYRES32=r69, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400080000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ff0f00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r73, @ANYBLOB="40010200400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400feffffff08000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000040000080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000400000008000600", @ANYRES32=r77, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c0004006861736800000000"], 0xad8}, 0x1, 0x0, 0x0, 0x80}, 0x4000801) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f0000000ac0)=ANY=[@ANYBLOB="5be7cce10ffd486a06ab5b5c582d7f9c68c8750a1a25023100007769e4d698db4a52e5686d653d75736572637075736574282c61756469642c736d611b78eed3f604e9faaf72"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:49 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:49 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x0, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) [ 732.619292] device lo entered promiscuous mode 19:50:49 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:49 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x0, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 733.962019] device lo left promiscuous mode 19:50:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:50 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) socket(0x2, 0x2, 0xdc) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r2, 0x0, 0x0, 0x80) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, 0x0, 0x0, 0x80) bind$inet(r3, 0x0, 0xfffffffffffffefb) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000004, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x0, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:50 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x0, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) [ 734.354729] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [], 0x0, 0x0, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:51 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x0, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:51 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) [ 734.929867] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x0, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [], 0x0, 0x0, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:51 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:51 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [], 0x0, 0x0, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) [ 735.160757] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:52 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x0, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:52 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r3, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x7fff, 0xcd, 0x1000, &(0x7f00000006c0)="13c662fed4a1548a9ad46ac0f992f47d2ca2e738039f0fa6da6a933b1f9f6b494074638a611e70d977429857839da07c9dcf8d514108015f83ef57258d73e8b51e06e1af497d8920c75bc504c6c36469437cbc98141921dac02a100b0c226c0eae1028f16de4eea870aebe590db53f1599ef937e7d85fef065720dffae3581d830c5b3e337d1b49ec035836774a1de748fca93a6e35e822c8b87c0c67dcedda14484e971571c8ebb23f8d97aae7f11cc7c51be9edace6f229b9a744d35ebf2c7cb56eac04b4f74e3937d8d4c346bfbfbda32c5dcf949127efcb2ae376e838db469ce8a94dd71e516c6aa9486a357cebeb0544680eae5f1077afb5b5ae79a69900d28963d587e3b5154c348f32d7e76ac59c76dc745d6943e134dec0cb3005a1c6beb0c7d42c7f85aa5fdda88747e2e0310af638a004f9753c318365b6141d227c1daa0703eb2b5bf62582db53f162b058d7788a3acb9d3ca042312da6813f71408767fc670e071dc61c536bd228a1f6066f763fb79d8839e1d3ed4e1b0c5968363223f49b62ace5e064c58d54cb6f0de1694cc3fc1a8bca9181f645a3e80bdf0d5a7bb792a6ea85d7702c0e4d0db6d62660ec11c356f0f69a57a2732ea1dd2fe13a9cc64f33639a1942c545132d7d0bce77c7f576887242916c925e58bfd35491e892747fff2154c795edc65158805c7ffb0f53ea0b806e5f2de2cd8f7690187ecaa017d3628f6687bd435413895670bd391dc5cafc1053d73430aa7e5de182ec2374c8363a36a4181863d914c62fbe3a07124933d214ed2a3fcc4cec5e5cd14a932758b339f754e01afa0e935bb11f89eca4007672a92bf54f942d08375853ecbef755d4500446e9f6fe30b6d5d9023b6efae83667f864b47f400555c8dd35fd5c981c419e9b2fae0b696577f50423353f1738151b88a514d5d72e548346c0fe4f74416bc4ac88305de242b1ea2e9016d923fd0934b486988880dcc063de91b738eff2e0124187f1763d335e829336ceda72749e9f2279f13a12c0286b4af01829a60b7281d25e45e9a319a866a71c414b2300aa5821fa1d33a255a33f22a494be8224d5a2e7429ddcc58da5709367dd8ab49db4ca54a9102ef226a2d2b5d3362bd5227ac23a498ba018f3f12e1d9f360881446cd762266f330bdab14da1665b22a0602042237147c3883682594a47d68efb3607125a7f0495c0988849f4c1e2035079986a37ce6839ced704ffa22de0639b7ba34d93f58bb8b7b960cc87afb0fc36df14a5fd92c49227c75d48b91e40e38548214b13c75121611f7995177030ef361b1330777edaa7b12b2fc7439fa866d9bf0d09015cda618b98c3e15b6f277ec58afb00428a92ebf453057269d4f13d68a790785c235bdec4584fb7ead978e2df0de74b8502dec6b7679b97793c5954eda225fe5c73e03c2f46f1a445b476cd02c5a794ee096a4931ff535a15591570d0457bc6a9819a405ff43f82a074a26a50f3d128647debe56405441fee744afe115bbaed04dbb62e0e71b3d482af87c87d01438e3c29cc4d095d23419a11515a869a6bb0b072af3a9107bd2271b9028696dea88678d22c57e9e421eecaa1fb0fd91b65a8be0f0298e43d34e6828e41652bc1a5e9e1bc1def91dc8f907ab1a6d3456aa1298317d290ef0425ba29f3b1784c487218aff3e25b30047b3aa4916cd4ffbc9dcc5c6cbe7ed4c952881b205eafbcae0f114ffb43d892426eacf396de2266fbf2e37506f9d2e15a1be2b857218959ba462b980a3ec5344c4d43db2008802ae4296fe0a9e8a5e51bfad268778bdd965976c2768cd1c27ee12120446c8d9aba0c0a6c1b7681eb26025321fbdc920573c067cd4e9b07d783be86d2c96f5f14eeef92f3a255a7feb59c709f1ff69df10983dd9d4b5ab55947a6e86af0c3eabac927596578495d6e92ac9c55f63edfd38f5c4d52f35e5f74c84678408a5f43b7245b990d2f98f12e7e9cc6d7b1f0cdd03253edaff249bf1b9cd56b4285b896d2b988a9081040ef19ba532a30f6c5e4573365bcd4aadaeb5ac7616d6ff1f082acbe436acc87a489b2f3b85e6ffc96a4bd4e8816c59ac4968d55e9b904a60b93ea1b6feba316dba40b92030ee64ca49304f17ba1e086499921aa4e92d501094ab6c17af559f2f93b9fe4bdd154c41c0f4eab4e24a0debb4199d114d33e7200de558c9352882f50fe5d5b42c28c9f7bdb5325b50c4ce6be52863e2b84bcf6ed0a0aad0438c3e0aa79cc2fc37671ac32522e22d63b27f6711c5f664133f9cb694b8ba32f722a113b96e4a0395b2e1f6790ed8070cc476ee2929f6df606a1bf0bafa0290b22e6d49d9ebf78f7c928c53cc994baf583fd7b1b8e6533c2aca54c0cfeef2bfd40f27bb867bd9d50a9edf21d8113d3fd16d531dc9de876ed94b45248106ae1af166d575a058c627493ef28f477298b56d9e39eb3fc73a715971911f7a67dd8b430d4d49d6d7aba8ac04b82f770cfbbc159dd5f24bb45d811a379a7f387d87fa2a5350868da7825dff8bcc8b271970f4393954de5446ba46fe885e630f0fefb390a810d9d3a2663339cfe6ec0a09b039bb4a2736329809fc9ffb6136d9e425f18a88153e09143d05a1e3d14187653b4e33fd0ce1f7fbe186d174191b4c27d125c361bc1ef27016b51139c614736e1e519f1f8b6e2fe15c5d159af9aacf24ae98adcd7bdf0cdb8a1b117f27e4101237090c87171dc65227dffca92881441a8845de92643131a33f1b451ccabe9fdf863099a9c5d3101af6475cb9ab1ecd85a4b3d629f1e9f4b309503439af3221bafc72ef219bbb6ceddc2eac52e3e7cbbab751454097c9fd26b007dfd5919dfc7d8c1c664331e83b90a5025dd560429ca2a4854c96a1e4e4e7598f2529a3f9c4acb3e2c77500fe3c391e9934feabd5b6f2fea6a102b49d7a84823f2cfd51c9afe4f77120e9545a41a80002c3842f9f2bacc0aff3ecb7e276ebb939ea03c6aa6729fbdf1092ecaed024b92732f1f366edf47deba4d32c9f9bf646bf9b1db6d90f36dbb46fd14d7137908163e8f95ad4facc38537a21159a5404968885df92b65f0280ff5c7c39610770be4267e1edf784bbe27a954b92beba884f5e46166d4da42647ebf75efa76f62708535ae2d25f7759127d533abc7e415b1e8bfa3eb0242ca58db0774c171b12ea9269ba4f29692d244aaea05d6a75a6637c58c039a5b080166910911cf150af5063dbd13495608bef3c602c8efeb8641465b0a03cf73953d9e276f2a0b46bc36b5533db6a4e25ff72c6a5489ceaa156026167d8268ef3474ea76c44dbedf365b4f6dcb1be1dcb308d703b7e6d332b32ed51ad067bb3a7ab2668d54cc9df0296d46dd3708582fe27ee232632601979565381b8b3ff7d1b805de9b724f9b281e6553c4547fa81c5e9ffe96c5d80ab20139ec3bb32cee565ddab05f39ea15848335e013583e6156b9b85f40a8771ba427644755f263923755dbf091677a12c89b99c0f20d35f32b975764c0b4db37cede70ddc1a8c21f646cd95abb19ddea9eb5f9db83426f3e87f49db3d3a7ef32c24f69c06a4e8e1333a7b642d5636b87b31c7cd437802e8bae9cb095c48a2f64d22f4ef6ba8f79cf235401220d60af1610fd35a5bc16a4c5ac4bef78cb89fe489a91eccbb8a6c8a9c70dffbe5b6c6e457578e33310eb9bc0e59adffa0edacdca4ea1a15bbd5b1425b1a49bda9d67eaf566ebbd7f0ae8367be4f4a50acb56ceeaec3e9ef6392fd147e47aadbd1eb9b335f55b374edb6b65ed4330e7e038abad9962c056895694399c330a9e1700a56b2daedc913a0863f626e11119e5af9e05684cf34ed98ec394a917c949664049d73208b672f6ca851199f1069dbaaadeaa441c880005bab3e893941f0512abbdc9b24b47d6971c513e7f5f11206e825d3b279fdf0f6253d13b8aa4882c9db9ab6b7543394b5df6d85d6d9b7f55edfc2a1c87735ba162b898f6f365f1012f453a69c6c4449fc42c58acafb698f53907410c66fa36af1e655ff1a7187694ca70305b7ff9b93b13676d996f4ca9429aa85133159febb0a8cf1475e6c8e70160f31099d2c533a7df18d0946a3e70a861ed5657c68bb82218891eb7aa011292cc69f55215a712f3f233ffc4b397eb97180198886d4b65815dbc5dd44521c82b6ea4765a7ccfbe1fc4446276065f4bd191cef7789dd0cdb1ac1a602f30919387974a7c3bf591aa3a1c00971bc48b96bb8bd9765b6ec76dee8e71fa7cf351f6d5293cfa79c25271ebc45a2a5bf4e2340d9bd873b87bb38524024a393f94cd39c18f987c72bfaac5cf12ba924282345cd76d4620c71facb78091505a7a94b3677ff755764ce5230d1c937fee9c128acd55d1e4107238953512616cfe78110c9fe3b052d53b9b2cf4022250c49e89aba63a78625f632dbf6389a551e570dd0702fc180e13e8e6221ccfe838eda02483797cc5fb22757c02042a626e92afc7ce4fa2a5c28c6c78b3b15dee3f2dd463e5f08b5e56684deca783eeaca8fc999bb187a9e2747fedfde63ea89239581eb9eff1c22a397230992e7119dd1f688837aaeb266f09b9fcef898e4cbc8440ec042536ae42ee1967182430a0634be1df003f3943ca358cac50ca0eacb9f9e7e7c03439e71dc4da83dc82b90b325883b69eff804b1e414391675854cf2c76406020a5d71f711dadd4bfa2e99f4dd65f3b5a5b8dc327b71d62dfc61fae5b1671e46b9b51221ad5ffba597d2312d747588230318fd0018fbdc2cd707bcc2eb29b6dc7323cfe760d8e0ccb7a2c5665f38c4f3311c843e423ddc4b656fab1708dbf531c4c5ce0f8421a9b5c41c37f88813fd1161584a8c20054f939b0a1d846bb1b325650b378a9f6cee366af52cfb34e30d4fcda8abb0b9eb1e837a5e2a7461a325be64504225243b7857de996e767a6bf3ee790e162c54ad35505dcd64032bdb3d2b6b8435d03c561707897bba6d5cb4beaed16b8030848302f0e2b1822d45310a566ebd6415562bdf9f7c64b5c6917ce3d09985f989b842f47539aa27d5fa4ce8a15eac1121a05c9e1723509f0d99c957101b42d7e69fd49936669dd05afd4f213c6f117199c9e028c2a3db4ae204593654662707a5f154fb21cdb58e76cf1a34d74644f2bb87548398642a47e1667f2202b0103bc96e2804da781394f10f8361e838fe9358a04eafd616de79c01caf8440673bc54466e8f0fce696e56ef772d526bd37b568ce2729d8e7ed3033545232c3ee64463cb7f226a005ab1852087dcba80a315032d5b01dfa7ab2f88093b8b0f62e9312c20663cada78aa98f204556e3b2511db75df7b04f571a0738bec55d7b90f65af91f8031da3429f599d603afafd0eda2165970862cc69209c4cbd0fcbc66fe85c8c5c540bbd0266edd95b136781d0b5a89c20dc4c875c4b47f9cb83d0634f101302bc3f2a96b0071b6851a88a9a63852705c735451c7970a405181a3f252f034d15f193a634628ea6e98082d539970598e4f29992c44c5e69b4ff0b8424cf4bf5d6cfc16af81db01d0e466d812d6022084da34c74fe0911087256033907a114310eca767cac3811c32b273bf63ef67a5d72a3628e87ce17c35ae47f95d93eba37ce63ab5401e0a4af1b5d0a2fa6e6be4ca71497bede43cb11778acd70fcc58e6f9270b2fc836a26c9015b88e975bcfda296e4af188ef7b0a321050166d0946f9dfc7b2e0fa0ff8e25df3c9f7a3dc447ef4efee73988996f9b8e806d89c8a5b98adb51b68cdc2b9394fdf0e3cd2f16b20d81c7d5acea5670dc68444f01e190e6e2"}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r4, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) getsockopt$inet6_buf(r4, 0x29, 0x30, &(0x7f0000000600)=""/191, &(0x7f0000000000)=0xbf) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:52 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x0, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:52 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0xf791, 0xc1c, 0x2a7f], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:52 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:52 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) [ 736.127579] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0xf791, 0xc1c], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:52 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000000)={0x18, 0x0, 0x3}, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x1, 0x0) 19:50:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:53 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:53 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0xf791], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:53 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3], 0x0, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:53 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:53 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3], 0x0, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:53 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3], 0x0, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:53 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x0, 0x7fffffff, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 737.058414] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value [ 737.721625] ip6_tunnel: ‹ xmit: Local address not yet configured! [ 737.745897] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x0, 0x7fffffff, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x0, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f0000000000)=ANY=[@ANYBLOB="73a8a9aacbe7b79afe3d77696e6e742c66736e616d653d75736572637075736534282c61756469642c736d6163386564536ebf908f516b66736861bd002c00"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x0, 0x7fffffff, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 737.983084] FAT-fs (loop3): Unrecognized mount option "s¨©ªËç·šþ=winnt" or missing value 19:50:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='\x91\xe9at\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f0000000140)=ANY=[@ANYRES32]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:55 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791, 0xc1c, 0x2a7f], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791, 0xc1c, 0x2a7f], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791, 0xc1c, 0x2a7f], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:55 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r3, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) write$P9_RREADLINK(r3, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:56 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791, 0xc1c], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:56 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff], 0x0, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791, 0xc1c], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791, 0xc1c], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 739.962601] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x100000271) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, 0x0, 0x0, 0x80) getsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @loopback}, &(0x7f0000000140)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x4, 0x0, {0x0, @ether_spec={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local}, {0x0, @broadcast}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x0, @random="c524ca8bd8de", 0x1, 0x5}}}}) fcntl$notify(r4, 0x402, 0x1) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:57 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 740.632736] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:57 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 740.912712] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:50:58 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) timerfd_create(0x9, 0x800) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c6673ee616d653d75736572637075736574282c617564696404000000636b66736861743d2c00"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r4, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) getsockname$unix(r4, &(0x7f0000000140), &(0x7f0000000200)=0x6e) socket(0x0, 0x2, 0x0) getsockopt$bt_hci(r2, 0x0, 0x1, &(0x7f0000000600)=""/4096, &(0x7f0000000000)=0x1000) r5 = socket$inet6(0xa, 0x6, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000001700)={@ipv4={[], [], @local}, 0x25, r6}) 19:50:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x650) 19:50:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) [ 741.813884] audit: type=1400 audit(1573588258.270:151): avc: denied { wake_alarm } for pid=8244 comm="syz-executor.3" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 19:50:58 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x3) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='slortname=winnt,fsname=usercpuset(,audid,s-ackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) 19:50:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:58 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791]}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:58 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 742.316152] FAT-fs (loop3): Unrecognized mount option "slortname=winnt" or missing value 19:50:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f0000000600)=ANY=[@ANYBLOB="73686f72746e616dc2f39a496abfe295653d77696e6e742c66736e616d6525757365726330d663a9fe414c904e8075736574282c61756469642c736d61636b66736861743d2c00267681df7ea440b18db8be4556ddb2723dedcb74eecbaa241e2c65618e0779168c93d72c37b82fe12f97e44f4edf407c59537d4c6658b4dd744033b77f5a"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:50:59 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:50:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791]}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:59 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [0xf791], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:50:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791]}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:59 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:50:59 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:50:59 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:50:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x670, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6d0) [ 743.294371] FAT-fs (loop3): Unrecognized mount option "shortnamÂóšIj¿â•e=winnt" or missing value 19:51:00 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f00000006c0)=""/145) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000140)={{0x0, 0x0, @descriptor="08effababdcc0fcd"}}) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x10001}], 0x800810, &(0x7f0000000600)=ANY=[@ANYBLOB="734e2b72746f616d653d77859d64696e6e742c66736e616d653d75736572637075736574282c6175df68642c736d61636b6673686174528a99397fe3ddb26804aaeac8585c4b21e74032b9883aeea3a6f88d192bcbbeec64937216b51cc5df4441a0269f65e2dca94156476c823965b320ecbe0c501e61947fe61eaf031854eb8d4a7ee7deeee0011f4f5b3e4e7fca2d9bd45d51bc4f73686e0fb9aed3217981de0200e37e380dc5b4e8dbd474bd028b4e08e71bd06011"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:00 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:00 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:00 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x0, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:00 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:00 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x0, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:00 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:51:00 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x0, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:00 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:00 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) [ 744.347296] FAT-fs (loop3): Unrecognized mount option "sN+rtoame=w…dinnt" or missing value [ 745.029383] FAT-fs (loop3): Unrecognized mount option "sN+rtoame=w…dinnt" or missing value 19:51:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) write$binfmt_misc(r2, &(0x7f0000000600)={'syz1', "df666727911463e24b13849bb215a57d21461f0574d22b60b251b462713d09d96401bf846e33e18abf1f0afad649d7164f7a918622d7625e3af61946654de595f06d00608f1059192194933f17ecf0e9637dee028c1649987c9559973fa7fbbde9fc47e321dc28a9669dcaca39e55a4eae6e0d721d522e9083b340d5977911469ace81b189ebf60a5133f06bee11b9b868b7fe85df15a415877cd2d070c4ab5a971546d568789745b8307633e6285c7b1b315830"}, 0xb8) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:01 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:01 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:01 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:01 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:01 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:01 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x640, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a0) 19:51:01 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:01 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:01 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 745.367481] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:51:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="28000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000fe880000000000000000000000000001fe880000000000000000005f790000000001000000000000000000000000000000000000000000000000000000000000001f00"/188]}) vmsplice(r3, &(0x7f0000000180)=[{&(0x7f00000006c0)="735d018bd58f28e0ad7238c654e1441fdd14ecc1e7a9643915a01dbe358d867885d9d0afcece806e4fddbbf30002c5a1192245e52959fe8354d9328ef100026c213f33503d6806941799974f4ebe58f2c0c435daee1b3e04a435a32ef8d4c349b76ccf3e38c22b5a054c7101b029cc6bf9a990cda596a9e17a4c7731207bdf035589098f8258a3", 0x87}, {&(0x7f0000000100)="38eb12a0e3c11a29f709ecdae0f9831b9527942cb0b94e403ec78a8271213e62ae997f7703bf69f381bffb", 0x2b}], 0x2, 0x8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x4, 0x5}], 0x841012, &(0x7f0000000600)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c6673726370756469642c736d61636b66736861743dc273bf2c0073fea1a7aacefe000000cd2bf15cf8729b0b18f474b707371fcb44910c2b939ce8d9188d8e0ac4e714feb5376848a95f250441ad7f4e1b3979944fe3b7781448203d63962ded022b3fd11e9f45575b93db41dca3052f6d09b266e30ac249cb71b841a83eeac6b5f51425f164dd683bb62de36bba9b9a6f153d24e37b264ce4aa94078efdbaab6609a50b914138d23dac8ec6b613"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:02 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:02 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:02 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:02 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:02 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:02 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:02 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:02 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:02 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x0, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:02 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:02 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:03 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x0, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:03 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:03 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:03 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x2000, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') r6 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f00000000c0)={r7, 0x1, 0x6, @local}, 0x10) r8 = socket(0x100000000011, 0x2, 0x0) bind(r8, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f0000000000)={r9, 0x1, 0x6, @dev}, 0x10) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000600)={0x64, r5, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r9}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x16}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xbc}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x19}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000000}, 0x20002020) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:03 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:03 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x0, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:03 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:03 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x10, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000080), {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x9, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:03 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 747.175995] device lo entered promiscuous mode 19:51:03 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000080), {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x9, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:03 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c, 0x2a7f], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:03 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:03 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) [ 747.265530] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:51:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/validatetrans\x00', 0x1, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x103000, 0x0) fallocate(r4, 0x40, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x1, &(0x7f00000002c0)=ANY=[@ANYRESDEC]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x11) r6 = syz_open_procfs$namespace(r5, &(0x7f0000000180)='ns/pid\x00') sendfile(r2, r6, &(0x7f0000000200)=0x70, 0x8) socket(0x0, 0x2, 0x0) 19:51:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000080), {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x9, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:04 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:04 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:04 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:04 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:04 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000080), {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x9, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:04 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791, 0xc1c], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:04 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:04 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) 19:51:04 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:04 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 748.260746] FAT-fs (loop3): Unrecognized mount option "18446744073709551615" or missing value 19:51:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000000)) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000080), {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x9, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:05 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 748.884818] FAT-fs (loop3): Unrecognized mount option "18446744073709551615" or missing value 19:51:05 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:05 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:05 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:05 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [0xf791], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:05 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) write(r1, &(0x7f0000000340)='/', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000080), {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x9, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:05 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:05 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) [ 749.110908] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:51:05 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) write(r1, &(0x7f0000000340)='/', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000080), {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x9, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0xe28bfc87fd404b8b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 749.792706] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:51:06 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:06 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) write(r1, &(0x7f0000000340)='/', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000080), {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x9, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:06 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:06 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:06 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:06 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000000)) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:06 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x3], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:06 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000000)={0x88, @loopback, 0x4e21, 0x1, 'sh\x00', 0x20, 0x7, 0x4e}, 0x2c) [ 750.071728] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value [ 750.191836] FAT-fs (loop1): Unrecognized mount option "fsname=usercpuset(" or missing value 19:51:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:07 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) write(r1, &(0x7f0000000340)='/', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x698, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000080), {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0xff, 0xffffffff, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188, 0x4, 0x10}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xe9, [0x1, 0x3, 0x6, 0x7fffffff, 0x3, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0xffffff00, 'veth0\x00', 'sit0\x00', {}, {0x7f}, 0xaf, 0x1, 0x20}, 0x0, 0xe8, 0x210, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x81, 0x81a, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x1c, 0x28, 0x15, 0x3e, 0x1, 0x28, 0x1f, 0x3, 0x6, 0x1d, 0xa, 0x7, 0x14, 0x27, 0x3a, 0x14], 0x0, 0x9, 0x50}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x9, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6f8) 19:51:07 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x7fffffff, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:07 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x110, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:07 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:07 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) flistxattr(r1, &(0x7f0000000000)=""/49, 0x31) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:07 executing program 1: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x3, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r1, 0x0) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='security.apparmor\x00', &(0x7f0000000140)='broute\x00', 0x7, 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x628) 19:51:07 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:07 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = pkey_alloc(0x0, 0x2) getuid() pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, r1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:07 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1a, 0x2, 0x20, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 751.034110] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(¬audid" or missing value 19:51:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) r3 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) getsockopt$bt_hci(r3, 0x0, 0x1, &(0x7f0000000600)=""/193, &(0x7f0000000000)=0xc1) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:08 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair(0x2, 0x2, 0x1, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r2, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x15c5) sendto$inet(0xffffffffffffffff, &(0x7f0000000200)="edcba14bc15fd83278a89dd9a7fb633e250cb586b47198bd5053ef6440c44a567192dc380fa6eba1c4179813e43ebded49036a7ad7055dcbf70990d465944efe8112b25dfb5725b975d21486817709e4dc17b2dbfd93e2160f94018d842e282021e2c4c9f1c920339c0e4921edf41c6957d769be29722671a18e82e0f2541fb7a380b1434225df63bc095fb3f070fd3daa8121a292a8d41694d611341279e77e59579f5d4473360b913120d3b6072046716f4e99b757f38ee1009817256fecd182440a031b4f6730a5196f46898d64688f018ab906ef8fb898c198b1182f2e134a963d8dce35cfc9a27a6d4a35ad795ce8", 0xf1, 0x10, &(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800002410000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000004000020000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff7f0300000000000000000000000000000091f700000000000000000000000000000000000000000000001f0000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000100000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000001c00000000003e00010000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000055ff4d274af3e7490000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x628) 19:51:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x6, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:08 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:08 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) signalfd(r2, &(0x7f0000000000)={0x4}, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:08 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x800000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) ioctl(r2, 0x80, &(0x7f0000000040)="1d1a68ed43f4cab9eb9bc2c41d1b0aba7856fd78a94bb4a96bf19b7d1a8733932025556e0ef512465273fd261b27fa83f9825e17fc5904a6bfa9333f16dfd29ff6a94640d3d1eb0247f9f7b0f34b01b15291338ee99400cbbc6957ed8c06973f60480d1f9cd8c1435c58ddd4e57e28f447290a0d91ef82f45605ab8478ecca8bc05356289ffd5db8998d8bef9fdaf5fabdc4adceac0512e54f0d60eb097f74d53b079b9492310af54420c2172a895c52db168f9aba7d0725b4eaeea1") setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005de6731d9df11bb1000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000010000000000000006000000ffffff7f00000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bbdf08163c00000000766574683000000000000000000000007369743000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000af0001000000007bf74a016d2fbd5f906863ccc74f0500000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000280000000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000"], 0x628) 19:51:08 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r1, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) write$P9_RSTAT(r1, &(0x7f0000000000)={0x5c, 0x7d, 0x1, {0x0, 0x55, 0x20, 0x0, {0x4, 0x0, 0x1}, 0x40000000, 0x80000000, 0x422, 0x1ff, 0xa, 'CLUSTERIP\x00', 0x6, 'veth0\x00', 0x8, 'SECMARK\x00', 0xa, '&security-'}}, 0x5c) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:08 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:08 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000080000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800002400000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000004000020000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000048030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff7f0300000000000000000000000000000091f700000000000000000000000000000000000000000000001f0000e0000002ac1414bb00000000000000007665746830000000000000000000010073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000100000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f80000ed000000000000000000000000000000000000000002006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000001c00000000003e00010000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000102200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000800000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000001f02abcc32ddb7e0bcf82e"], 0x628) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_context(r2, &(0x7f0000000040)='system_u:object_r:apt_exec_t:s0\x00', 0x20) 19:51:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x0, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:08 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r2, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x0, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) [ 751.963594] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:51:09 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x30b357c4faeefd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0xd) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) vmsplice(r1, &(0x7f0000001c40)=[{&(0x7f0000000000)="b3e80a89e5e8614b8feedb5c8c317a20f3afd1790a0cc3baec1349085f5927692d39439ebcd1f92f4e7f4730573a1a993ff3a7b35ce50e0930eedbbd881c43acd47701a9136c3f78724d9b6637ca9e299a9cb65c9541901aa3bc6a951c5ad6b4dcf6070f6b66edc46a4857246776ec6b93dffe9f9e2c39b14649bbd2dbd264a289d1a03a073b317d147d3e0985991a0629868f77454b13fc", 0x98}, {&(0x7f0000000840)="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", 0xfa}, {&(0x7f00000000c0)="3f309f0b4483905a287ceb2ac1237609042bfa43f651369a989550e92a95e40a7492b4f318deb4679edf7eca90319c8c7eb8cf422728c0ea04c3df", 0x3b}, {&(0x7f0000000940)="1a68625b1df88df33b3c085270daab991f077454ea4db4e889b2405903675dc3f73500b633517431e25fd2de1c598271e11ece090eb763274ed059889dc5c5f5697eda6eb305e21c387c1db34aeebca0ae71fcfe755245cb12c177c796302969f44cd3a837aa3629c4701507e8e5fa6f796985a15ac3ac06037fbc72241f9dc2340e62e4f64893c56b682288eb86758278d0946dc3703645ad7fb8bc79f8292ac24877488d0f8ac0a5753d80d7c2b819ccccfe48f91d0832ad580306ee1ed5ce", 0xc0}, {&(0x7f0000000a00)="6494116054c15a11bdeb8b272fbce988da97d7d6e2ad2bf7dfd8816c513e19c56fc1179ecd061390a0a4bc4f18594e53cbb71c69054948469c7f1cf6cae2e2d53a8baa148bcb4abca4fde720a73e2ee5a064a291a8fa64c298c9b525bf961d276f0471242338d89be92299584a781008516830a052db3c6cdf3563534bdd6898de382f2dff66471647797cc5c72a309a99a54d4217d7942d4643dad213b653bba90105a5347d1cbb47407aa842597f6648afa007631c2337c7497a5cf7", 0xbd}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f0000000100)="4dee7b1481f3ff5276ab65937f5d4fc32647ddc79fbc3659925e283221b0edb69d3d6ad003d3f3d5a325ad26c883f86aaa16c4b521cae26d09", 0x39}, {&(0x7f0000001ac0)="7d249f2fe67497f6951c42e4f695b97a770ac57891d41c1489d40ed9d3721900d0284dfddf9d7854d8216430a38cfdc1432291c0680aa44806a3633eccc2d531aa37ab0e98a68e5eb0a20d3efa652fb7ac3f9b006c0fa6b63b5a4d5a77079279c74971e8136f50b13a29c11972a68d49800c1959807c1db12ce90d9dcda5e86b8a766c6e39d44913b62136fc168594e7b4629a12c4b45831c5179e54dc836a489ea502eb763af58fc2ce39fbbce8040d402123de152726e520c0bf0a8443ca", 0xbf}, {&(0x7f0000001b80)="8ca9e5ae20e8a5ac255858b1b47086facc5067c2cc15769b69078f12d82fb8b85474501251eb3c183cbc1c3073a80f64f5d4acf2ad011c3ed23b540c7386cc1419ca51c2bc3b05c108229cc7825f26fd2ee6fbf3788fff2072efa5ee9a583c743fcc0cc5f81a9c9bb951bbc8ac984072c4540901c3fc19358f250b9dcd958f1e1b8dc1db17", 0x85}], 0x9, 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000010000000000000006000000ffffff7f00000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bbdf08163c00000000766574683000000000000000000000007369743000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000af00010000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000280000000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f261be8bc18649d1372f82000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x628) 19:51:09 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @esp_ip4_spec={@multicast1, @multicast2, 0x401, 0x3}, {0x0, @local, 0x0, 0x0, [0xfffffffc]}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0xffffffff, 0xffffff70) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x3, 0x0, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) [ 752.658846] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:51:09 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x6000, 0x672a17fae2731552, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000000, 0x2000000018031, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800002400000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000004000020000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff7f0300000000000000000000000000000091f700000000000000000000000000000000000000000000001f0000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000100000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000001c00000000003e00010000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x628) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000040)={0x5, 0x9, 0x615, 0x8, 0x12, 0xff, 0x81, 0x40, 0x2, 0x5, 0xffffffff, 0x101}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) 19:51:09 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) timer_create(0x2, &(0x7f00000000c0)={0x0, 0x2c, 0x1, @thr={&(0x7f0000000000)="853306a579329ab6607cb3d5edac9199baa23cd2c46e3024b6544391d7e7b0440f43ae402919a2b113534839e998f8f78913af299798531ce9f51c96e6b0f06e59ec6b1e38a03425107473887ba9eb05ac98ec5b2a1b5b929f76532f", &(0x7f0000000080)="850d3fed7f8c85d04b34d78023ef"}}, &(0x7f0000000100)=0x0) timer_settime(r2, 0x1, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000200)) 19:51:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x6) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000024000000000000000000002e7000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000004000020000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff7f0300000000000000000000000000000091f700000000000000000000000000000000000000000000001f0000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000100000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005b8c466fd7fea262e9060902a4e40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000001c00000000003e00010000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000052b4952fde0c8d4e4a95f3acfd9a4c87b25e8d2aec515d97f8056314ebebd097e0f1dbd653e57d89d8891ab893418b13828f622b4292fe5709ccb65333c1b88498e6d1be9457dedfc0cef0f44d14965a673a202540f04466a0e2fa9d3abd1add241d8ae4064bc7822fa2c56b84fec63fb97263e54ef0e75bc5b3f49a8e32230e81c68bc16d743886ee8db80f2f2b0874ab006d8f517a159113323b7a9d3f0ff5dd3ddf2fe1ffb73e492cc9a9d361744e5e7d8a00540ce1fed7bf2e6ba172462850d6d2aa02c02d5f57993aa85a6e485b"], 0x628) 19:51:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0xfffffffffffffebc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)={'mangle\x00'}, &(0x7f00000005c0)=0x54) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7f) fchmod(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000180)=0x0, &(0x7f0000000200), &(0x7f0000000500)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) r8 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(r8, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) r10 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(r10, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010001000000000002000000", @ANYRES32=r6, @ANYBLOB="020084fc", @ANYRES32=0xee01, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="00020000f240bcc2677bd069104162a6a8b01b1729cad1f89a5ac5f0ca49ac94d1aebfba622076e200007aa65fc613be62addf977ff97207e91717826baaa0fc20bdf1ed5b382a37e79c39869906da63d2c87191b447c9c2d9e8d5d69318cf811effa16f1689cd9663f61fc19ad4404b0d354ebd", @ANYRES32=r4, @ANYBLOB="0209802c", @ANYRES32=r4, @ANYBLOB="0200240044f229dc83a108889f00e9a4114ebda82439c9c9116c9755b1e787ce28360eadec011414d70f51faa9f4bedee23406382c214fd5273ba2972e708a5a6a572a32067e51a808c82092b8c1f41972cd60874269ddb2c874c262b996d60b079cfab57c97fccf2eb0a5e479bdcfca5856469bca17f61dc901daf683db4b0a3675d3687357", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r7, @ANYBLOB="040004000000000008000700", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="08000400", @ANYRES32=r11, @ANYBLOB="10008113000000002000010000000000"], 0x74, 0x5) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x6) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000380)="b725f25e429de7c8d3774680208a2a955f5efc8a41e705914a2634da795ffe08fef4aa5be066819e5e9a2b962e724bc1ee1517e9673f3206d0545df7d870477bd086a7615e6231024b25051589b8964e959e98071740a5a00419b1cee85044977d70e6550fd0a4d455d5b36768103523e97d375f2b138d059282e77aab17d9389628d6c0cf0ecd990483bf17bb745ccc7733e42878af496aae768fe58396c91bb2820fa0fd98594c0905e0e3f668087889663d5f20aa33013f4c04d1b2270cc977bfcfc5cc98277d560b9dcd90", 0xcd, 0x36d5}, {&(0x7f0000000480)="63cd61ccca04616a4ca8975218bf0f6208c6deb2d0820a5b7b46565df57276790d4b9138aa2347d5f647edf57ee2224e7b33773dda690edacc32e3022565669bb32c8261d05f6490", 0x48, 0x5}], 0x800810, &(0x7f00000002c0)=ANY=[@ANYBLOB='shortname=winnt,fsname=usercpuset(,audid,smackfshat=,\x00']) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x0, 0x2, 0x0) 19:51:09 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r1, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:09 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) connect$netlink(r2, &(0x7f0000000740)=@unspec, 0xc) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'dh\x00'}, 0x2c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r1, 0x0) socketpair(0x0, 0xa, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f00000000c0)=0x8) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff], 0x4, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x84000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_CREATE_OPEN(r1, &(0x7f00000000c0)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x3, 0x8001, 0x2, 0x4, {0x5, 0x0, 0x2976, 0x3, 0x400, 0x4, 0xf421, 0x1, 0x0, 0x4, 0x1, r3, r4, 0x81, 0x2}}, {0x0, 0xf}}}, 0xa0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 753.000983] FAT-fs (loop3): Unrecognized mount option "fsname=usercpuset(" or missing value 19:51:09 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000108, 0x810, r0, 0x2000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000000)={{0x1, @multicast2, 0x4e21, 0x4, 'sed\x00', 0x2, 0x0, 0x4f}, {@remote, 0x4e22, 0xbf4a4c0a3e079253, 0x9, 0x6, 0x1}}, 0x44) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r2, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000080)=""/227) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @esp_ip4_spec={@multicast1, @multicast2, 0x401, 0x3}, {0x0, @local, 0x0, 0x0, [0xfffffffc]}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0xffffffff, 0xffffff70) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:09 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xbc00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) r2 = syz_open_procfs(r1, &(0x7f0000000000)='cpuset\x00') r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000140)) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r6, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r7, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x11) r9 = gettid() r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r10, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r11, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x118, r3, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r6}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r7}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r8}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r10}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r11}}]}, 0x118}, 0x1, 0x0, 0x0, 0x1}, 0xc084) r12 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x7fffffff, 0x3]}, {0x0, [0xf791], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x1, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x1c, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff], 0x0, 0xff}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 5: r0 = accept(0xffffffffffffffff, &(0x7f0000000940)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, &(0x7f00000009c0)=0x80) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000a00)={{0xa, 0x4e20, 0x47, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10000}, {0xa, 0x4e22, 0xffffffff, @local, 0x6}, 0x2, [0xfff, 0xffff, 0x80000000, 0x6, 0xffffb492, 0x9, 0x9, 0x159b]}, 0x5c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x61041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x100000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000010000000000000006000000ffffff7f00000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bbdf08163c00000000766574683000000000000000000000007369743000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000af00010000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b000000000000000000000000000000000000000000000000000000000000007379723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000091fe14049aa6e70abf49bde500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000280000000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000004000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000033efaef6d9c2672e1c6d8efdbb16f6871498c2e842c975478749db7f98bb790c9c6d2dbd0f60a8f7a55c4c414c64ac1a24f9f854363bf893c8ccd117b42dd9aeac4960c8c0ebe8257ca62a864abe0a370b75094e6820a8217037ff57ed6e28fd4994387f07a7a29570c480dc5d52264f5bfe80f1b99aabd9c3f1d941efebc12e9d9d0a9fa6fb697903"], 0x628) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040), 0x10) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x400, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="68883c8c2e4ea3eb203a4d895218be69f794b55cf77cb64f9b21f02cb5d32520fe8c54", 0x23, 0xd1c}], 0x4, &(0x7f0000000840)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}, {@noextent_cache='noextent_cache'}, {@noinline_dentry='noinline_dentry'}, {@whint_mode_off='whint_mode=off'}, {@user_xattr='user_xattr'}], [{@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0xf}}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x1a}}, {@smackfsroot={'smackfsroot'}}, {@measure='measure'}]}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000240)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) r4 = dup2(r2, r3) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000200)={0x20, 0x14, 0x1ff}) 19:51:09 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) fcntl$getflags(r1, 0x1) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) r3 = getpid() rt_tgsigqueueinfo(r2, r3, 0x2f, &(0x7f0000000040)={0x28, 0x3, 0x9}) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fstat(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r5, 0x0) getgroups(0x1, &(0x7f0000000000)=[r5]) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r7, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000140)) 19:51:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:09 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800002400000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000004000020000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff7f0300000000000000000000000000000091f700000000000000000000000000000000000000000000001f0000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000100000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000001c00000000003e00010000000000000000000000000000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000d5150c900045434e0000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x628) [ 753.340260] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 19:51:09 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000540), 0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x2de, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0xfffffffffffffe8e) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_elf64(r1, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 753.395858] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 753.423164] F2FS-fs (loop5): Unable to read 2th superblock 19:51:09 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) [ 753.502130] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 753.527909] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 19:51:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) [ 753.598081] F2FS-fs (loop5): Unable to read 2th superblock 19:51:10 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0xbffffffffffffffc, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup(r3, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L-', 0x6}, 0x28, 0x3) getpeername(r3, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) r5 = accept4$unix(r3, 0x0, &(0x7f0000000040), 0x80000) ioctl$sock_TIOCOUTQ(r5, 0x5411, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000240)={0x2b, @remote, 0x4e21, 0x3, 'nq\x00', 0x52, 0x13c, 0x32}, 0x2c) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000001040)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3ff00000000000000000000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"/1575], 0x628) 19:51:10 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffff8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) prlimit64(r1, 0x6, &(0x7f0000000200)={0x1, 0x5}, &(0x7f0000000240)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8915, &(0x7f0000000100)={'veth0_to_bridge\x00', @ifru_flags=0x40e168bd11686af3}) mremap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000000000/0x4000)=nil) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) getsockname(r2, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000300)=0x80) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000140)={0x0, 0x3, 0x2, 0x3}) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r4, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f0000000000)={0x10000000000000, 0x100, 0x1}) 19:51:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) memfd_create(&(0x7f0000000200)='wlan1\x00', 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="28000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000fe880000000000000000000000000001fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000007f000000000000000000000000000000000000000000000000000000000000000000000000000000003ad459562aa702cb5482303bf8b6c3a5120cbcdaab71e08cfe2451c07e2a9dbb23dc2ad49f5a7cd48fe9e0b326c0adbd054d4f1713aa0d7cdf5880e37881bc88184557e5c157f4c4dd87a2ce2589bf4162a77df40cc373dce0f479785778816bc03cf0cad100c7cffa9d55e42a7d0a265730ca6504cc1cb138675b"]}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000100, 0x2000000000011, r0, 0x3ce96000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000000)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x1ff], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendto$packet(r2, &(0x7f0000000040)="6051a4bf2c26aa4f1bb3b7df14dd43fe1f86b129023ba2e5c39fda17967f79d8adbb0131f43e9c45faa3acf7936638367e7e417b8a2bfb2248162ea408d008ff17980af094c96ece4bca32704bf86e818a674931326ba3939454449bf3aff983cd7b2afc65c112c65eaf70fd18cbcc77d338372d81d4941b192626acf09153e74dff3231dd7c28e7f6113868e78757f1f46388f197807cdaaf3b2ab9e80a521c7b9669e2255efcd40227d367ffb94a2611cce6c45bc855c763b60e562c7c36f2bfd5bc11193d61307e66f6a164817ac5d33df5d309f498dd5c207bda8cfffb2e9afa7f57ab9c54c54f4f17bfcd8be41f1e", 0xf1, 0x10, &(0x7f0000000280)={0x11, 0x7, r4, 0x1, 0x1, 0x6, @dev={[], 0x18}}, 0x14) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:10 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) lseek(r1, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x6}}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x4e24, @loopback}}) 19:51:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0xfffffffd, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r2) fgetxattr(r2, &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f00000001c0)=""/215, 0xd7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x88001) r5 = socket(0x11, 0x3, 0x0) setsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4) bind(r5, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) getsockopt$IP_VS_SO_GET_VERSION(r7, 0x0, 0x480, &(0x7f0000000100), &(0x7f00000002c0)=0x40) open(0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r5, r6, 0x0, 0x4e68d5f8) getpeername(r3, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r8, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="28000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000aaaaaaaaaaaa000000000000000000000000fe880000000000000000000000000001fe8800000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028ae7f000000"]}) socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r9, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="28000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000fe880000000000000000000000000001fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7129f8420ff54f6664c6573225d4ff428052ed28b782439b0695d56145a96764dd1564676c5f202d3e2999892e88f59f40a06e8d8ff7a73925092cd8222dd2ef68384eb596202a6f4dc14b952c64a8046419c5f6414d9"]}) ioctl$FS_IOC_FSSETXATTR(r9, 0x401c5820, &(0x7f0000000000)={0x9, 0xc4, 0x7, 0x3, 0x80}) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x0, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 0: r0 = gettid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x80) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000000)={{0xa54cda151ca59816, @multicast1, 0x4e20, 0x1, 'lc\x00', 0x3a, 0x6, 0x51}, {@rand_addr=0xeef7, 0x4e24, 0x2c477d6a39c3940d, 0x7, 0x8000, 0x80000000}}, 0x44) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x1}, r0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r2, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x2a7f, 0x0, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0xc1c, 0x0, 0x0, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:10 executing program 5: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:10 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xa, 0x0, 0xfffffffc}, 0x0, 0xa, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0x0, 0x0, 0x0, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x5}, 0x28, 0x3) 19:51:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000770d260a191f03a34ab4fe4f4e5bf2248ea74ea64994454d2c05ed71bb08040759e0dc99ea2bba5d74f8406f797c6c45b087235916144605d611f3029d3bfb168b7bbeeda2be042ef6aecd81381560cf4b0b6dbc8fb13a8bd40b7ff539cc2b19ad3a68d8c79c122a75b1"], 0x628) 19:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0xf791, 0x0, 0x0, 0x0, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) flistxattr(r0, &(0x7f0000000000)=""/126, 0x7e) r1 = socket$inet(0x2, 0x6, 0x2) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000105, 0x20010, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x7, 0x5) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000940)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000098000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000002dcbf25821b8716061d446e966aea592929a16988126abc133acd3fd521ee4c88e4f543157a0ecfc8f6ddfc740d5b7c4f6eb353edafbaa090429d8db5b092915fcf7161b2e494b35d748d7e79139911e7f0ff405ccb46e2a691746d354fb5b98d9566c1f97685cf75c0b940ece9e184bc743dbcac9b0b7da7a487e88a10cd2218c882ef3e806940abc6961df585d3270caad3dc2b213d4e0be946176135bb6e5ea2ae7c45618649801203c1e44d5791e35915c22430ea1c2f403a7d9358e4742f25620b886675510211d1df3ff8af7a5d4fe3f3d2a733e00e8fed2501d4cbc70c4b632d970a5cefd14bf4b0066016c797d490f46bfece33a7715645ed20532d9a8c12fee407f37317c7b21c52d"], 0x628) 19:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x200000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r1, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xfffffffffffffee7) 19:51:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r1, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) fcntl$setown(r0, 0x8, r2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f80000000000000000000000000000000000000000000000000060005345540000000000000089d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000001000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000001515073ff9719e1323897f865108dccf6660fb5451c1277ab21c70866f03d0526d6ea706f43e8daa3d180365fd84f144dc7af6"], 0x628) 19:51:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x80) getsockopt$inet_int(r1, 0x0, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x7, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x104, 0x4010, r0, 0x31d1e000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000b00000000000000000000000000000000000000000000feffffff00000000"], 0x628) 19:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) set_thread_area(&(0x7f0000000040)={0x5, 0x60002800, 0x4000, 0x0, 0x0, 0x1}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000020060000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000009defc66000000000000000000000005000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f80000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000ffec000000000000000000000000000007000000e0000002ac1414bbdf08163c000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a7330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000000f00050010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000000003000616464727479706500000000000000000000000000000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000001000000aaaaaaaaaabb150002000000000000003e00010000000000000000000000000000000000270000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000008201dcb6c8a1520900f9f33c764eac1be533ba998b"], 0x680) 19:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bb00000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x628) 19:51:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x37d53edca7a50e79}, 0x0, 0xfffffffffffffffe, 0xfffffffd, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x8000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="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"/1742], 0x680) 19:51:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80, 0x0) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x1, 0x5d, 0x4, 0x7}, {0x100, 0xff, 0x3f, 0x4}]}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) munmap(&(0x7f0000000000/0x1000)=nil, 0x1000) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:11 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0xcec408ae08531157}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r1, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r2, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) sendto$inet(r2, &(0x7f0000001680)="b6919f95519a7b0c86a01891f46d9c7d78f26fe56237a856e265ba0eccfa5152ced78969c74fc00bf86a2276354618e88234eb31bd0e92f6926498bb1799d6f31b09c8fabbcf8f1cc5024e5af6c2053067a2ca34d103a324d495b1f1ed9d4473ac843b3b0d3d6a7410821384e329878ca0c9a1f4b7f9875cdeaa91c9ab60550718f7f985811ea9d9558671a2ae77a7ca5adaec5ffd51d726770c2fae8fa5f5ac5721e5c9e87d216d8052bf49fd179bf8aca79fe0919d64595ce9b3e231b8911d89a50d1a2fad8213b08cdda99ca057ff717078ee1cb98f092f5beefb15c864ec01ffb868261d8e7d6ba8e6217af71079b003fe2fde6d0d049fc893140d51cb4aedec8a60c24b3d2f275296f9669ec91e17e3e74b97d3d60d051f90585d41009ac92ff33982e6a8264a5c76f985d9f9c0b7805b74df2d2e6db8b9455be3ff3cf945e7d3d5dc04b4ec6d65d2dcd8663f28b859911632e21769edd3544f286c2a6f4677fdd7fec14fdd86cf1eec7b607188cf558191b13f88a433fc33ec4586dfc88220ce791bb7c3c367ab67ace81f2e48339f5f77bba3211f96c2869c2c160e4770e6a8a1fe8ba755361484660a5efdc7320bbdc31ba60c0e324cbe119be7a77c7c883fe3744cec8985a471d7b50aeff5f1052e2bb3c3ad054d8abcd8bdd44d2a463315166e514b4755b12582174ef0e818559d5091d46954eb6ffa1744941586cf3f8d839447ef7700e33d71be835a35a30922686398fd1ee1a61fb36b5202e249ef597164597fe1e43d9300615e7a5030245bf93fb78228297db16a36cecb80d3083bfeefb3fd3653c463c607635dd3566099a1c272bd20daeec1f117f4bdf6ba57efe3b0aeef9d09056549bdc4eaa261b65c5f0ea718324341ddebe6cdb23f5f58be49e0724a800e567369325e6f61fc6e518b87aead5528ff667f45bf134a52fb9a1b464bbfe622e41c7c5e314776ea3a1b79a5a1b07bebe80571034fd1a94b6e47ca00861b1c9145d1a23b237447451e7df7ddfba9cb33176d1d370a1207eceb8bb04a5d9c028cbf2c6b50649fa805339212674578c3548560b4280cfb470afe1e86cdb241e9a6abb8f82edf8dc12d6f201f20f9a04b61b4c66f2950a0e3dbb1245216e5acadabbe50bc54c2527453c2de752af463ae3dd338a8c9c64b7b4fe98d8217cd35edd00f9e2b6146487c83d2371a6bfcb89cfee7d97017d3ad4ac0e1c05bedffa2e47270e72790e113d4daa1a286b687bbf4bc9a5ec38abe5fb3d155f0df46b7cd628eb93a63c4e08d69c0bacd9e760fe0023a54b256686f58b448d0432e8f3c9a1bbbfadc3fe684e8cba3e311ccfd5eb5adba773445e988a18eede8111a3bf47f374a09d581d174d7a0fecdfff809882a4f19c53216291aebf668139899aea0be11769bc3563d665345a74c6347536b7d33c5125c59825fac0f8eadd5919e0e9bafd7d8eb6b1325d32e53c7c13a2dd9c1733665bd54dfd55c0a4a6c52956c0d8226f0d38b7b79184592e809ddd715c4ebfa3868970d90a2ec99a768d94cc7763cb86062554ff7baaf63d1ed391e568022205ccb26e2c076cc18bb1155cc625b74b8803c5897f371095153e34a23f4ea1e848b9224527a93c35cc3331207df3668a0314f9ac021050e90d72d4f2f97c8dff6df3f23703190616171fcb9bd52734534c79d1ab9bac543ae14e27105a04c5c74097cecf434a37aa22392c6c17bedfbbeb320c1f109d42b02444a4820c15327c27828f5bb4f83b436f9bd16e06a540939a58d2e6475987be865b99f20475cf5e710dd1b091550b0a5414167aa9212519f17e18fbb8bc9d59749aa277a324f8a8697dd49efbae4cf1f9c9a91c2c048f652b90807f877531da129c7632f9016d8b63e5df0c3868c20317e74b92735b2c677b964d3e772304af2cc3a7b41923f39903dc1177e5cf201b962ef7307d0986ac8cb15c355c24e38f987dc3076c503a6d66d47ac82e89455e40378356109a098c942db4e7814cc07171fa2a93dfb42e5a6736af764876c805d7964af67fdccb6b0067e6b84b67a0ce534a91625ba0a0f441ba00d328d680f0390d53d5e054331cfe5f1a47cd547775443c6197d4936e1b85812e34bb06988fd58342a8ed78fb5b57cb28bba9cdced74f1c75c8cef4a57438d58e496d4cd4dc4b8a8e82e5ce177b0e2ec1c018dfd1c5388530e650847c00c174c2679442c57c37f5ac4626fb286d5906c5f1b649185cded9c929b4aeb980f17eb1e3012634a85b5c16012cf4f274e5201b32d29d9d1c77ee1bb0c92b2e58b8a16be55471f3fd9a0a2cb19502dee1169292d2aa330215581232aa0e0910ca12e8969a32b1e588266da719c83472997a9f9c3259a2d273eede0504a25f49ad031dae9df1b0166af7ff8ee70b338fb4608c9baef1e37d0514ab38206e71fec137b2c612bfb8292c8f68a7579802fc39081743801a496b963e6daf8324923c7bc6109441e1099a43b8856cdf9b3b2d71307f3d30450befa5f2ba864c156b78695f59f23bd4bfd3e5f70aa85aeff347e1ee0a8129e5c177b62a72aae897ab956802dcee050a5089f3fe64f1589520406742cd83d304d6f2f9c0ec77b86b69675fefd8528ae9f18c87f8b037cfdef54253e9d455093c98e4caf3f54e1a76ec536372c6e0ac97ed97f1309e58c4d1fe452fd6d19d1491f1cb68883c71cfe68dab386eeb318e80f7250beef12e5ebe9d7e4c6a93581e1f749c08149c90a02b25bfe68f49abc49b1bb5fa6b2a70885fceb6c543505c25b0f65f332e9fa3981b0ecc83908204716e120f03241beba539f51e8b8283f822479337c1aa527003a7c270531d82df62096f97abddc1b3b01d2e1ec0a98af8259eb17b0c3dd3193c93c98584a7dff585a71d11c74c4db0f618d0c678c146024da3758e3720987d03fb90f799abfeedb9f066c1b0c37e589b3ccab883b72d14bb6981c5de30500cc5ec033bc5f870f24ee9ad56d87d1385552156c4cf1b1883fc48a8d8db947e7906b474697b39681dc25601653055828833e89e5761924496f98c69a2d0866184b9495e0f069499493157577e036e3472a8cb0efaf44f24dce7c7a95403d5a82ae30d681e6fcb1c866944542ce7643a9dbda52daa95069a8c8e5238383dd876db49a37e277f66af35b097a4e3e94d5b41489ae9efd3162354beb46037572556b5e9be5abf3164192e2ad43d2b5e2f517c48382a6beaf2a9b52914ebe37689e2c6660f66db11ee4818f9d5a51c730bbcca1460137df611337ef76914123662747e1f6807a20e3b9758c1f5dca21d9fd7e01506e7da0fa0ef8f08035c0d001e62f17d2d79468ea45b6f05b4f3c58e539d3fa80109746c4535a1475ac9435982f35f9ac0a9c014191d4458bc2c8ecfe64cc9590a0c665785ca820393cdc78fa3006b1fef8df66a3e7049a15a165da14577ba19d999c551c4287c5e184a414eefd5ecde12326edacc91bfb6e954214cb41d77f9d84fcc08442025c2f2392f20ecb25514a9f8811d6be747146bfa2978cc314bbd47e89dfe5103b3c7b2630d7c15bf1b27d636224ece57b1d5a5e97c164843b564872c9719c4bc374daf60354ffacff1977df810eb34ae6e4044cad64ea0fa6b1634c63c2e624a7dd9e024e84b12af44d5133ca71e7815b4dd19682736525e29b8148683348223b990653d9e5c601fdb97d7874ae78270419867ab07eac1c2231e9b3c39e019ac70fdb73ffff3616cd9d361969e2c4c4acb48647c808fa743f9787b9712815a1b5ae7de3a53bf585340c4fa019602567374727a557e8afdfb9ba7ea9811bd87532ba3231fe49df1424d962d155fcdc2c677560b7f22ce52753b1e34d6f189f3509df86fb22fc5bb2d143c7e41caf56051e27bd4677974a364e63da2f16a1351f2e0c37e1ecabfda40fa850b46ff3287aa450b1f30667ba09867e636c13a61739b3f797ef9ed41be7336b2dca59c52364b257b91cc57a97a988d96b5189d1785b13cb0788cf8bec57c441e945c45a2cd97fb057ed40e259663f7dfcf031fcd31ccc4694d40cf4c9d0847d802c3c7e74da05e9dcd809bcdaddc5813c243623d8137a956744b2181cd98383285765e2838329646a2d3a30bb02b8149e6ef8caf6fbb32246c76a2f304156361801d955e28b2dd50c47047f387487847acc40146f1e57b87de87659cfdff78b9112126b608f658e0a6e8ae482b30ea4eafa181a4f3641dc21f5ec8b5c1b2000bb7f4fb0a9737b94a24fe72160284861e38e4a950bff2658649abf71c751e84c5cba96ba893ab943ad9dbb01027946ac42ed098b35b04085d55607f56419d767a18a5ac0703235218dda046a15f267d0f0298add0726c1e27a4b0ed445bcfad279f4635f90eccc598aaa1f5c4f001298c07225aa6b6816fad788c4023e4b19bce15f151de14e3a27a42b9570790427ccef4a9ed8ca384edfdfe02c0868d9f73c61bd33e96ebef87fe215a89c28c38ae6d08c194b062a60c767b8b1ec5aaf500a4769dfdf4c514984b9c93bcf5412dcd77f813422771e253329e52dca80362e04fcef7ab93c7337dd322d662276f211e13f55b01405289e41010a6ec0fb4f5045bd53dddcdefbebc724eafee7ff9bb3a7ba2da865515f22f877488adda794349802fdef70fc43474dfebc826f51810c66f6ddd66f2fbcf5ec75ace69b152753a97e97e9e5b89d25a03cc882ed1cb8cabbb510a2f9f57912bb1db0d65f1de6352fb50cd9e1e3264e7e28f2e3590a9420d4028f96987fbff9043b77561d015ea9634c2f664e240fb9c8eddeef7e0cc5c97c28f4052d579546d2174300b158ac7055964810c13d7d8f08fca55ac4b2f0b3638dea8fab44818a0007b1a194f3ec04742c94e6462586dbb8b4a89b0a52992d4dfa7965b2fc1898de59c5bd04a0d9905d03bb00a9fd7d07020c32a107a846b86b29331253cdb6099f22e44683fbf9753a38a43834972e8c096e3c3a29c3b363efb3b51dd3d7921e318e8e1a2e2855d1cba994828bf07f352e407bc8c3522e19ae6443125e8e54fcc5357415524f480d9d78094836fe954aff5bff90694e24cb3da496b2391bf97947952953de083db9863a04c04c6c700db50b04d13687654819bd00a2e5e0097eb218e863ababf2e07c8f984a20d33803a7a1f6785996480beb5056bb9cfe65948f1ef5d45497e32d6b0782b4765f8db7d3ad1bad15a4bf7d607f212618e8fe5f0a540b79a081acc22d58f149209711db15ab270ef1940684c4e7513e51ae3b81b24178aada556b560eac1096470137403d09ee363708c8a580a7a193cbe14c5ce7e2393b09e1a08319285c1d8112c536ebb4cb816e4686df45c652ef3f5ef8f6f3c11f2894d914bdab58929569252117d8fac95e6f41052c514ddeb6faa916b25f146d4649fa8033169ddffc4ed2c5312ef29c978b44602a4cf2281d4e5f9dd64c09c9c08bb99e6a88908172903507c09d319410527abce573b3e36a11ac8f6985fe95e278cbbbfd4a17ac709e2928577d6e9b57b52cb758d75a650779dcc925785388918e80e9f189823a3c73392305d157a0e2f00d629ee27ba97baaef7248d484837bcafcdaee326d5802093f367d88fc38648434a281c4bcef89c8df9115168d01440f4f3d69d1f44d9f636168036f9131f7b6a01fe77e03b23deedc480957800aa08ee3781d3cc8b863d1487155598c3dfdedfa94041103b80862029dc53e9d565f745a4afa0cdaac9815c53ab0ab9c5d2a7a2e0661b824be459182beff709db8cdfe48d2632f0c4d87b477b118be91b674ef8f", 0x1000, 0x890, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) 19:51:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x5) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000020060000e0010000f0030000f0030000000000000006000000060000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000005000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000007000000e0000002ac1414bbdf08163c000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a7330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00050010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000000003000616464727479706500000000000000000000000000000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000001000000aaaaaaaaaabb150002000000000000003e00010000000000000000000000000000000000270000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005ed1d8c7683fbbb6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000043b10000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x680) 19:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r0, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000000)=""/64) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c8050000e0010000f0030000f0030000000000000006000000280000000600000006000000060000000600000600000000000000000000007f000001e00000010000000000000000726f7365300000000000000000000000687773696d30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000e0000002e000000100000000000000007465616d5f736c6176655f300000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f800000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000010000000000000006000000ffffff7f00000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bbdf08163c00000000766574683000000000000000000000007369743000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000af00010000000000000000000000000000009800c00100000000000000000000000000000000000000000000000028015345434d41524b00000000000000000000000000000000000000000000000000000000000000735b7374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000280000000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x628) 19:51:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x2b) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000100)={0x3, 0x1ff, 0x3f, 0x61, 0x17, 0x3f, 0x5, 0x3f, 0x6, 0x5f4c, 0x1f, 0x5118bf4c}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x7, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) recvmsg(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000080)}, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00'}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0xff000000, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:12 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x4000, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x5}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [], 0x4}, {0x0, [], 0x7}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@addrtype={0x30, 'addrtype\x00'}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x15, 0x2, [0x0, 0x0, 0x0, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpeername(r2, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ioctl$VT_RELDISP(r2, 0x5605) 19:51:12 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0xc000, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000040)) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x21, 0x1, 0x1c, "16d221c68a579396d68c700dde3b3958", "62f9f01f0f4187404f34327a"}, 0x21, 0x7) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:12 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001040)=ANY=[@ANYBLOB="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"/1565], 0x628) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:scsi_generic_device_t:s0\x00', 0x2b, 0xb520703f73c5a9e) 19:51:12 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101600, 0x0) sendto$inet(r1, &(0x7f0000000040)="db63", 0x2, 0x8000, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x8, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x3, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:12 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8a900, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000012c0)={'syz_tun\x00', &(0x7f0000000340)=@ethtool_rxnfc={0x28, 0x0, 0x0, {0x0, @ether_spec={@link_local}, {0x0, @local}, @tcp_ip6_spec={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) 19:51:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00', {}, {}, 0x0, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:12 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x0, 0xa2, 0xaf, &(0x7f0000000040)="dd16282072cdd6e22ac4f6127b4fa8ea54acd6b33480263413302ef616d501a3c08fe682b08822226a3660c24ebce976bc5e45da3919c5ea85d4b569ed2ed4f98bd5daf05806abfbc85afc76fd16254bdf0e7a1ec299dbaeb91058477636b6aa54d7a054031784038fff676c12cb64ee23169b11f0211f4344e32320ee480ce634b6c83a15d0af6295823f3c082bb546474c564361a56d08e7b0144c2c47b79fe4b2", &(0x7f0000000200)=""/175, 0x7, 0x0, 0x77, 0x83, &(0x7f0000000100)="13937d7caa673b5a6b5a072a8f248c125677650fbfabf48fb9fd28924ff1bce523d17290fabe3010cd1e8679fd2dfb27258d2efd541bfdd23579dbb8482e8f9679a56c5475108d0253315c387073a18c7dab750bb6ed134a1c7149ea8e7ad4179ee1b60f32304c28e17ac9f4dae7fef8b026e2e86f5ab0", &(0x7f00000002c0)="267a5339c8f2bc6b78eda54a8aaa93e0ebee74a5c906e42cf7eef93bcf46740dc40aed03f4c4f6c2e9240910e2bf182adbcce7d244e93de85907992c19a6949279ab4e6f038acf6ac4cbcd6fe82997ed398cc6ff0bce10367beef91f10878fa8f4b25fe1ef30de0c6ceb5a7308d23aebda3103f7ec4f142c1330619fd7db3b56614198"}, 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) 19:51:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:13 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x620, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x40, 0x5, 0x2}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00', {}, {}, 0x188}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20], 0x0, 0x1f}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0x0, 0x1}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) 19:51:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x20000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001040)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c8, 0x1e0, 0x3f0, 0x3f0, 0x0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'rose0\x00', 'hwsim0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff]}}}}, {{@ip={@multicast2, @remote, 0x91c5b785df08163c, 0x0, 'veth0\x00', 'sit0\x00', {}, {}, 0xaf, 0x1}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1f]}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x628) [ 758.131394] lowmemorykiller: Killing 'syz-executor.4' (1831) (tgid 1831), adj 1000, [ 758.131394] to free 41512kB on behalf of 'syz-executor.0' (9164) because [ 758.131394] cache 65268kB is below limit 65536kB for oom_score_adj 12 [ 758.131394] Free memory is -13144kB above reserved [ 758.154118] lowmemorykiller: Killing 'syz-executor.2' (5166) (tgid 5166), adj 1000, [ 758.154118] to free 39472kB on behalf of 'syz-executor.0' (9135) because [ 758.154118] cache 64368kB is below limit 65536kB for oom_score_adj 12 [ 758.154118] Free memory is -13040kB above reserved [ 758.180999] lowmemorykiller: Killing 'syz-executor.4' (1238) (tgid 1238), adj 1000, [ 758.180999] to free 36076kB on behalf of 'syz-executor.0' (9135) because [ 758.180999] cache 62368kB is below limit 65536kB for oom_score_adj 12 [ 758.180999] Free memory is -12984kB above reserved [ 758.240849] lowmemorykiller: Killing 'syz-executor.4' (1295) (tgid 1295), adj 1000, [ 758.240849] to free 36160kB on behalf of 'syz-executor.0' (9135) because [ 758.240849] cache 61168kB is below limit 65536kB for oom_score_adj 12 [ 758.240849] Free memory is -13072kB above reserved [ 758.253839] lowmemorykiller: Killing 'syz-executor.2' (3916) (tgid 3916), adj 1000, [ 758.253839] to free 36060kB on behalf of 'syz-executor.0' (9135) because [ 758.253839] cache 60368kB is below limit 65536kB for oom_score_adj 12 [ 758.253839] Free memory is -12972kB above reserved [ 758.264970] lowmemorykiller: Killing 'syz-executor.4' (1649) (tgid 1649), adj 1000, [ 758.264970] to free 36056kB on behalf of 'syz-executor.0' (9135) because [ 758.264970] cache 59568kB is below limit 65536kB for oom_score_adj 12 [ 758.264970] Free memory is -13072kB above reserved [ 758.278357] lowmemorykiller: Killing 'syz-executor.4' (3099) (tgid 3099), adj 1000, [ 758.278357] to free 36024kB on behalf of 'syz-executor.0' (9135) because [ 758.278357] cache 58868kB is below limit 65536kB for oom_score_adj 12 [ 758.278357] Free memory is -12972kB above reserved [ 758.289665] lowmemorykiller: Killing 'syz-executor.3' (7134) (tgid 7134), adj 1000, [ 758.289665] to free 36000kB on behalf of 'syz-executor.0' (9135) because [ 758.289665] cache 58092kB is below limit 65536kB for oom_score_adj 12 [ 758.289665] Free memory is -13072kB above reserved [ 758.302458] lowmemorykiller: Killing 'syz-executor.3' (7160) (tgid 7160), adj 1000, [ 758.302458] to free 36000kB on behalf of 'syz-executor.0' (9135) because [ 758.302458] cache 57392kB is below limit 65536kB for oom_score_adj 12 [ 758.302458] Free memory is -12972kB above reserved [ 758.316410] lowmemorykiller: Killing 'syz-executor.0' (5472) (tgid 5472), adj 1000, [ 758.316410] to free 35992kB on behalf of 'syz-executor.0' (9135) because [ 758.316410] cache 56768kB is below limit 65536kB for oom_score_adj 12 [ 758.316410] Free memory is -13064kB above reserved [ 758.331055] lowmemorykiller: Killing 'syz-executor.4' (1328) (tgid 1328), adj 1000, [ 758.331055] to free 35972kB on behalf of 'syz-executor.0' (9135) because [ 758.331055] cache 55968kB is below limit 65536kB for oom_score_adj 12 [ 758.331055] Free memory is -13164kB above reserved [ 758.341700] lowmemorykiller: Killing 'syz-executor.0' (9135) (tgid 9133), adj 1000, [ 758.341700] to free 35968kB on behalf of 'syz-executor.0' (9135) because [ 758.341700] cache 55368kB is below limit 65536kB for oom_score_adj 12 [ 758.341700] Free memory is -13064kB above reserved [ 758.341712] [ 758.341714] ================================= [ 758.341715] [ INFO: inconsistent lock state ] [ 758.341721] 4.9.194+ #0 Not tainted [ 758.341722] --------------------------------- [ 758.341726] inconsistent {RECLAIM_FS-ON-W} -> {IN-RECLAIM_FS-R} usage. [ 758.341732] syz-executor.0/9135 [HC0[0]:SC0[0]:HE1:SE1] takes: [ 758.341754] (&mm->mmap_sem){+++++?}, at: [<00000000e66c6591>] get_cmdline+0xa3/0x2d0 {RECLAIM_FS-ON-W} state was registered at: [ 758.341765] mark_held_locks+0xb1/0x100 [ 758.341771] lockdep_trace_alloc+0x18c/0x2b0 [ 758.341777] __alloc_pages_nodemask+0x143/0x1a80 [ 758.341784] __pmd_alloc+0x4a/0x330 [ 758.341792] move_page_tables+0xadb/0xd60 [ 758.341798] shift_arg_pages+0x1ae/0x470 [ 758.341803] setup_arg_pages+0x60d/0x7c0 [ 758.341812] load_elf_binary+0xa84/0x4a90 [ 758.341818] search_binary_handler+0x14f/0x700 [ 758.341824] do_execveat_common.isra.0+0xf81/0x1db0 [ 758.341829] do_execve+0x3a/0x50 [ 758.341836] run_init_process+0x33/0x37 [ 758.341842] try_to_run_init_process+0x18/0x48 [ 758.341850] kernel_init+0xf2/0x163 [ 758.341856] ret_from_fork+0x5c/0x70 [ 758.341858] irq event stamp: 1781137 [ 758.341867] hardirqs last enabled at (1781137): [<0000000084fd4682>] _raw_spin_unlock_irqrestore+0x5a/0x70 [ 758.341876] hardirqs last disabled at (1781136): [<000000000437d2b8>] rcu_read_unlock_special+0x3a/0xb30 [ 758.341884] softirqs last enabled at (1781130): [<00000000a22ea9b4>] __do_softirq+0x474/0x964 [ 758.341891] softirqs last disabled at (1781111): [<000000001cb54127>] irq_exit+0x119/0x160 [ 758.341893] [ 758.341893] other info that might help us debug this: [ 758.341895] Possible unsafe locking scenario: [ 758.341895] [ 758.341896] CPU0 [ 758.341897] ---- [ 758.341901] lock(&mm->mmap_sem); [ 758.341903] [ 758.341907] lock(&mm->mmap_sem); [ 758.341908] [ 758.341908] *** DEADLOCK *** [ 758.341908] [ 758.341912] 1 lock held by syz-executor.0/9135: [ 758.341926] #0: (shrinker_rwsem){++++..}, at: [<000000004187c297>] shrink_slab.part.0+0xb2/0xa20 [ 758.341927] [ 758.341927] stack backtrace: [ 758.341934] CPU: 1 PID: 9135 Comm: syz-executor.0 Not tainted 4.9.194+ #0 [ 758.341947] ffff88018745f060 ffffffff81b67001 00000000000000f0 ffff88019f7d4740 [ 758.341957] ffffffff83cb0b40 ffff88019f7d5038 ffffffff84252000 ffff88018745f0d8 [ 758.341967] ffffffff81408710 0000000000000000 ffffffff00000001 0000000000000001 [ 758.341968] Call Trace: [ 758.341978] [<000000001214ebd0>] dump_stack+0xc1/0x120 [ 758.341988] [<000000006175244d>] print_usage_bug.cold+0x452/0x5a2 [ 758.341995] [<00000000c3b26f02>] mark_lock+0x6c7/0x12e0 [ 758.342002] [<00000000d770e62d>] ? print_irq_inversion_bug+0xa0/0xa0 [ 758.342009] [<00000000418ac761>] __lock_acquire+0x5be/0x4390 [ 758.342019] [<0000000075e2d675>] ? check_preemption_disabled+0x3c/0x200 [ 758.342027] [<0000000075e2d675>] ? check_preemption_disabled+0x3c/0x200 [ 758.342035] [<00000000cfebf57f>] ? trace_hardirqs_on+0x10/0x10 [ 758.342042] [<00000000d8ac0dea>] ? HARDIRQ_verbose+0x10/0x10 [ 758.342049] [<00000000cfd18e25>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 758.342056] [<000000004a918664>] lock_acquire+0x133/0x3d0 [ 758.342063] [<00000000e66c6591>] ? get_cmdline+0xa3/0x2d0 [ 758.342069] [<00000000840a9b14>] down_read+0x44/0xb0 [ 758.342076] [<00000000e66c6591>] ? get_cmdline+0xa3/0x2d0 [ 758.342082] [<00000000e66c6591>] get_cmdline+0xa3/0x2d0 [ 758.342092] [<00000000df773a67>] handle_lmk_event+0x169/0x920 [ 758.342098] [<00000000daf9ba73>] ? mark_held_locks+0xb1/0x100 [ 758.342106] [<0000000040cc3714>] ? lmk_event_show+0x390/0x390 [ 758.342113] [<00000000f4a829b0>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 758.342120] [<00000000cfd18e25>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 758.342135] [<00000000c94f63ae>] ? rcu_read_unlock_special+0x6cb/0xb30 [ 758.342148] [<0000000075e2d675>] ? check_preemption_disabled+0x3c/0x200 [ 758.342160] [<0000000075e2d675>] ? check_preemption_disabled+0x3c/0x200 [ 758.342168] [<00000000fc45c43f>] ? lowmem_scan+0x6ae/0xb70 [ 758.342175] [<000000006a8d286c>] lowmem_scan+0x6f3/0xb70 [ 758.342183] [<0000000031c27bef>] shrink_slab.part.0+0x3cf/0xa20 [ 758.342192] [<0000000021ed81e1>] ? unregister_shrinker+0x230/0x230 [ 758.342200] [<0000000075e2d675>] ? check_preemption_disabled+0x3c/0x200 [ 758.342208] [<0000000075e2d675>] ? check_preemption_disabled+0x3c/0x200 [ 758.342215] [<000000006f78c2ae>] shrink_node+0x1ed/0x750 [ 758.342224] [<0000000086eb5619>] ? shrink_node_memcg.isra.0+0x1360/0x1360 [ 758.342234] [<0000000091650b45>] ? __delayacct_freepages_start+0x41/0x80 [ 758.342242] [<00000000aea7ce9f>] try_to_free_pages+0x397/0xbd0 [ 758.342250] [<00000000a8c82f2b>] ? shrink_node+0x750/0x750 [ 758.342258] [<00000000524e0a13>] __alloc_pages_nodemask+0x930/0x1a80 [ 758.342265] [<000000005b4627bd>] ? retint_kernel+0x2d/0x2d [ 758.342273] [<00000000b2395f78>] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 758.342280] [<000000005bbe46ad>] ? gfp_pfmemalloc_allowed+0x110/0x110 [ 758.342287] [<000000005b4627bd>] ? retint_kernel+0x2d/0x2d [ 758.342296] [<00000000593f4914>] __vmalloc_node_range+0x25b/0x610 [ 758.342306] [<00000000cbcb2f7e>] ? xt_alloc_table_info+0xc8/0x100 [ 758.342313] [<0000000098866330>] vmalloc+0x5c/0x70 [ 758.342322] [<00000000cbcb2f7e>] ? xt_alloc_table_info+0xc8/0x100 [ 758.342329] [<00000000cbcb2f7e>] xt_alloc_table_info+0xc8/0x100 [ 758.342337] [<00000000e6cb6cba>] do_ipt_set_ctl+0x231/0x470 [ 758.342344] [<00000000e4c03669>] ? compat_do_ipt_set_ctl+0x150/0x150 [ 758.342351] [<0000000073fce679>] ? mutex_unlock+0x9/0x10 [ 758.342360] [<000000004c513139>] ? nf_sockopt_find.constprop.0+0x1b7/0x230 [ 758.342368] [<0000000066304ca7>] nf_setsockopt+0x6d/0xc0 [ 758.342376] [<00000000ddaa722a>] ip_setsockopt+0x8a/0xa0 [ 758.342384] [<00000000fde3c3c7>] tcp_setsockopt+0x8a/0xe0 [ 758.342395] [<00000000f0a1bc52>] sock_common_setsockopt+0x9a/0xe0 [ 758.342403] [<000000007e34343c>] SyS_setsockopt+0x159/0x240 [ 758.342410] [<00000000e3b86c5c>] ? SyS_recv+0x40/0x40 [ 758.342418] [<000000005434917b>] ? SyS_clock_gettime+0x118/0x1f0 [ 758.342425] [<00000000bc306b78>] ? do_syscall_64+0x4a/0x5c0 [ 758.342432] [<00000000e3b86c5c>] ? SyS_recv+0x40/0x40 [ 758.342439] [<00000000256a3e6f>] do_syscall_64+0x1ad/0x5c0 [ 758.342447] [<000000005cf25b24>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 760.271750] lowmemorykiller: Killing 'syz-executor.1' (4443) (tgid 4443), adj 1000, [ 760.271750] to free 35064kB on behalf of 'syz-executor.0' (9135) because [ 760.271750] cache 304kB is below limit 6144kB for oom_score_adj 0 [ 760.271750] Free memory is -13352kB above reserved [ 760.276933] lowmemorykiller: Killing 'syz-executor.3' (5053) (tgid 5053), adj 1000, [ 760.276933] to free 35036kB on behalf of 'syz-executor.1' (4443) because [ 760.276933] cache 304kB is below limit 6144kB for oom_score_adj 0 [ 760.276933] Free memory is -13352kB above reserved [ 760.281487] lowmemorykiller: Killing 'syz-executor.1' (4443) (tgid 4443), adj 1000, [ 760.281487] to free 35064kB on behalf of 'rsyslogd' (1890) because [ 760.281487] cache 304kB is below limit 6144kB for oom_score_adj 0 [ 760.281487] Free memory is -13352kB above reserved [ 761.661587] lowmemorykiller: Killing 'syz-executor.3' (5630) (tgid 5630), adj 1000, [ 761.661587] to free 35028kB on behalf of 'syz-executor.1' (4443) because [ 761.661587] cache 228kB is below limit 6144kB for oom_score_adj 0 [ 761.661587] Free memory is -13244kB above reserved [ 761.661694] lowmemorykiller: Killing 'syz-executor.3' (5630) (tgid 5630), adj 1000, [ 761.661694] to free 35028kB on behalf of 'rsyslogd' (1890) because [ 761.661694] cache 228kB is below limit 6144kB for oom_score_adj 0 [ 761.661694] Free memory is -13244kB above reserved [ 762.256433] oom_reaper: reaped process 9164 (syz-executor.0), now anon-rss:0kB, file-rss:16kB, shmem-rss:0kB [ 762.361801] syz-executor.0: vmalloc: allocation failure, allocated 2015744000 of 3757445120 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 762.421480] CPU: 1 PID: 9164 Comm: syz-executor.0 Not tainted 4.9.194+ #0 [ 762.428423] ffff8801357d7a08 ffffffff81b67001 1ffff10026afaf43 dffffc0000000000 [ 762.436464] ffffffff82aab480 0000000000000000 0000000000400000 ffff8801357d7b30 [ 762.444527] ffffffff815080fc 0000000041b58ab3 ffffffff82e3bc80 ffffffff81431d00 [ 762.452580] Call Trace: [ 762.455163] [<000000001214ebd0>] dump_stack+0xc1/0x120 [ 762.460535] [<00000000bf121e50>] warn_alloc.cold+0x76/0x93 [ 762.466323] [<0000000090c97adf>] ? zone_watermark_ok_safe+0x260/0x260 [ 762.472989] [<000000005b4627bd>] ? retint_kernel+0x2d/0x2d [ 762.478693] [<00000000b0a68c99>] __vmalloc_node_range+0x404/0x610 [ 762.485003] [<00000000cbcb2f7e>] ? xt_alloc_table_info+0xc8/0x100 [ 762.491316] [<0000000098866330>] vmalloc+0x5c/0x70 [ 762.496323] [<00000000cbcb2f7e>] ? xt_alloc_table_info+0xc8/0x100 [ 762.502629] [<00000000cbcb2f7e>] xt_alloc_table_info+0xc8/0x100 [ 762.508761] [<00000000e6cb6cba>] do_ipt_set_ctl+0x231/0x470 [ 762.514547] [<00000000e4c03669>] ? compat_do_ipt_set_ctl+0x150/0x150 [ 762.521118] [<0000000073fce679>] ? mutex_unlock+0x9/0x10 [ 762.526645] [<000000004c513139>] ? nf_sockopt_find.constprop.0+0x1b7/0x230 [ 762.533737] [<0000000066304ca7>] nf_setsockopt+0x6d/0xc0 [ 762.539282] [<00000000ddaa722a>] ip_setsockopt+0x8a/0xa0 [ 762.544821] [<00000000fde3c3c7>] tcp_setsockopt+0x8a/0xe0 [ 762.551482] [<00000000f0a1bc52>] sock_common_setsockopt+0x9a/0xe0 [ 762.557793] [<000000007e34343c>] SyS_setsockopt+0x159/0x240 [ 762.563581] [<00000000e3b86c5c>] ? SyS_recv+0x40/0x40 [ 762.568848] [<000000005434917b>] ? SyS_clock_gettime+0x118/0x1f0 [ 762.575849] [<00000000bc306b78>] ? do_syscall_64+0x4a/0x5c0 [ 762.581639] [<00000000e3b86c5c>] ? SyS_recv+0x40/0x40 [ 762.586989] [<00000000256a3e6f>] do_syscall_64+0x1ad/0x5c0 [ 762.592687] [<000000005cf25b24>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 762.672670] syz-executor.3 invoked oom-killer: gfp_mask=0x2400840(GFP_NOFS|__GFP_NOFAIL), nodemask=0, order=0, oom_score_adj=1000 [ 762.701471] CPU: 1 PID: 5053 Comm: syz-executor.3 Not tainted 4.9.194+ #0 [ 762.708397] ffff8801d50bee78 ffffffff81b67001 ffff8801d50bf1d0 ffffffff833f1c30 [ 762.716446] 00000000000003e8 ffff8801d50bf1e8 0000000000000000 ffff8801d50beef8 [ 762.724486] ffffffff81506e44 0000000000000000 00000000000003e8 ffffffff8282ac45 [ 762.732547] Call Trace: [ 762.735129] [<000000001214ebd0>] dump_stack+0xc1/0x120 [ 762.740484] [<00000000dae042b0>] dump_header.isra.0+0x142/0x74c [ 762.746618] [<000000001cf04a4c>] ? _raw_spin_unlock_irqrestore+0x45/0x70 [ 762.753536] [<00000000f2d076f8>] ? ___ratelimit+0x55/0x413 [ 762.759234] [<00000000a1ef5763>] oom_kill_process.cold+0xd/0xa74 [ 762.765459] [<00000000acea01a8>] ? has_capability_noaudit+0x25/0x30 [ 762.771940] [<00000000c061bccc>] ? oom_badness.part.0+0x11d/0x600 [ 762.778252] [<00000000f1d2e0fe>] ? oom_badness.part.0+0x12f/0x600 [ 762.784560] [<000000005eb2c50a>] ? out_of_memory+0x6d3/0xea0 [ 762.790430] [<00000000cbdec832>] out_of_memory+0x29b/0xea0 [ 762.796219] [<0000000092d409d8>] ? out_of_memory+0x41c/0xea0 [ 762.802094] [<000000008dba1489>] ? oom_killer_disable+0x210/0x210 [ 762.808403] [<00000000061a4159>] ? trace_hardirqs_on+0xd/0x10 [ 762.814364] [<000000000b7ef02c>] ? __alloc_pages_nodemask+0x10d0/0x1a80 [ 762.821189] [<00000000f103b072>] __alloc_pages_nodemask+0x151e/0x1a80 [ 762.827845] [<000000005bbe46ad>] ? gfp_pfmemalloc_allowed+0x110/0x110 [ 762.834498] [<00000000eb69a938>] ? page_cache_prev_hole+0x80/0x80 [ 762.840808] [<0000000058645eca>] ? find_get_entry+0x2a9/0x510 [ 762.846766] [<000000001e579474>] ? find_get_entry+0x2d0/0x510 [ 762.852728] [<00000000eb69a938>] ? page_cache_prev_hole+0x80/0x80 [ 762.859036] [<00000000998e0fd5>] pagecache_get_page+0x248/0x740 [ 762.865171] [<0000000045936ba9>] ext4_mb_load_buddy_gfp+0x90a/0x1100 [ 762.871757] [<000000006a9207e0>] ext4_free_blocks+0x827/0x23d0 [ 762.877810] [<00000000e3eaa4c1>] ? ext4_mb_new_blocks+0x3930/0x3930 [ 762.884300] [<00000000252a242c>] ? __ext4_ext_check+0x42e/0xfe0 [ 762.890440] [<00000000f091b581>] ext4_ext_remove_space+0x21cd/0x3a90 [ 762.897015] [<00000000b99d106a>] ? debug_smp_processor_id+0x1c/0x20 [ 762.903502] [<00000000936e4523>] ? ext4_ext_index_trans_blocks+0x130/0x130 [ 762.910593] [<000000001f646b98>] ? ext4_es_remove_extent+0x96/0x320 [ 762.917078] [<00000000564f396d>] ? ext4_es_remove_extent+0xaf/0x320 [ 762.923558] [<000000006cd2790f>] ? _raw_write_unlock+0x2d/0x50 [ 762.929606] [<00000000c3fda53a>] ext4_ext_truncate+0x17e/0x280 [ 762.935657] [<00000000001f2d03>] ext4_truncate+0x526/0x1300 [ 762.941441] [<00000000a8be50f1>] ? ext4_punch_hole+0x1000/0x1000 [ 762.947671] [<0000000055edde83>] ? ext4_journal_check_start+0x116/0x1a0 [ 762.954500] [<00000000fc7e61d3>] ? __ext4_journal_start_sb+0x114/0x480 [ 762.961243] [<000000001f4a3d9a>] ? __sb_start_write+0x161/0x310 [ 762.967380] [<00000000b548cd87>] ext4_evict_inode+0xc50/0x1270 [ 762.973431] [<00000000ab6f708b>] ? ext4_journalled_write_end+0x1180/0x1180 [ 762.980518] [<00000000ed35ddf6>] evict+0x2e9/0x630 [ 762.985523] [<000000007a2ed0e2>] ? ext4_mark_dquot_dirty+0x190/0x190 [ 762.992088] [<000000000a6d3ed1>] iput+0x370/0x900 [ 762.997004] [<0000000070821e1d>] dentry_unlink_inode+0x277/0x330 [ 763.003220] [<00000000bf6b5401>] __dentry_kill+0x333/0x580 [ 763.008919] [<00000000742089fa>] ? dput.part.0+0x2a/0x7c0 [ 763.014532] [<00000000742089fa>] ? dput.part.0+0x2a/0x7c0 [ 763.020144] [<000000005c2cfa41>] dput.part.0+0x509/0x7c0 [ 763.025670] [<00000000742089fa>] ? dput.part.0+0x2a/0x7c0 [ 763.031281] [<000000009c43bdbb>] dput+0x20/0x30 [ 763.036025] [<00000000636ccad6>] path_put+0x31/0x70 [ 763.041115] [<000000005808fd8f>] free_fs_struct+0x25/0x70 [ 763.046733] [<00000000b70912f6>] exit_fs+0xe7/0x120 [ 763.051823] [<00000000499d0bdd>] do_exit+0x769/0x2aa0 [ 763.057089] [<00000000d8ac0dea>] ? HARDIRQ_verbose+0x10/0x10 [ 763.062963] [<00000000af4279cd>] ? drop_futex_key_refs.isra.0+0x41/0xd0 [ 763.069789] [<00000000187c03ea>] ? release_task+0x14a0/0x14a0 [ 763.075749] [<000000009a16e856>] ? get_signal+0x1d9/0x1cb0 [ 763.081469] [<0000000075a45541>] do_group_exit+0x111/0x300 [ 763.087165] [<00000000e2e1a13b>] get_signal+0x377/0x1cb0 [ 763.092689] [<000000009ac2a28f>] ? do_futex+0x161/0x1a70 [ 763.098212] [<00000000f3a54859>] do_signal+0x9c/0x1920 [ 763.103565] [<00000000cfebf57f>] ? trace_hardirqs_on+0x10/0x10 [ 763.109612] [<000000004532c70c>] ? setup_sigcontext+0x7d0/0x7d0 [ 763.115760] [<00000000cfd18e25>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 763.122503] [<00000000f632fdeb>] ? __might_fault+0x114/0x1d0 [ 763.128374] [<000000005d0b42ce>] ? SyS_poll+0xa4/0x3a0 [ 763.133737] [<00000000c2c0ce60>] ? do_restart_poll+0x240/0x240 [ 763.139783] [<00000000ee65cdaa>] exit_to_usermode_loop+0x11c/0x160 [ 763.146173] [<00000000eb5e22ae>] do_syscall_64+0x3ab/0x5c0 [ 763.151877] [<000000005cf25b24>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 763.161867] lowmemorykiller: Killing 'syz-executor.3' (4594) (tgid 4594), adj 1000, [ 763.161867] to free 35024kB on behalf of 'syz-executor.0' (9135) because [ 763.161867] cache 244kB is below limit 6144kB for oom_score_adj 0 [ 763.161867] Free memory is -37468kB above reserved [ 763.173791] lowmemorykiller: Killing 'syz-executor.3' (5670) (tgid 5670), adj 1000, [ 763.173791] to free 35028kB on behalf of 'syz-fuzzer' (2035) because [ 763.173791] cache 244kB is below limit 6144kB for oom_score_adj 0 [ 763.173791] Free memory is -37468kB above reserved [ 763.211483] lowmemorykiller: Killing 'syz-executor.3' (8207) (tgid 8207), adj 1000, [ 763.211483] to free 35028kB on behalf of 'rsyslogd' (1890) because [ 763.211483] cache 244kB is below limit 6144kB for oom_score_adj 0 [ 763.211483] Free memory is -37468kB above reserved [ 763.338551] Mem-Info: [ 763.338573] active_anon:123493 inactive_anon:320 isolated_anon:0 [ 763.338573] active_file:28 inactive_file:33 isolated_file:0 [ 763.338573] unevictable:0 dirty:3 writeback:0 unstable:0 [ 763.338573] slab_reclaimable:7213 slab_unreclaimable:67501 [ 763.338573] mapped:52269 shmem:4337 pagetables:9257 bounce:0 [ 763.338573] free:35 free_pcp:276 free_cma:0 [ 763.338588] Node 0 active_anon:493972kB inactive_anon:1280kB active_file:112kB inactive_file:132kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:209076kB dirty:12kB writeback:0kB shmem:17348kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 763.338607] DMA32 free:0kB min:4696kB low:7712kB high:10728kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:8kB unevictable:0kB writepending:0kB present:3145324kB managed:3020092kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 763.338635] Normal free:140kB min:5580kB low:9168kB high:12756kB active_anon:493972kB inactive_anon:1280kB active_file:112kB inactive_file:124kB unevictable:0kB writepending:12kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28852kB slab_unreclaimable:270004kB kernel_stack:15488kB pagetables:37028kB bounce:0kB free_pcp:1104kB local_pcp:720kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 763.338672] DMA32: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB Normal: 29*4kB (UM) 1*8kB (U) 1*16kB (H) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 140kB 4398 total pagecache pages [ 763.338712] 0 pages in swap cache [ 763.338716] Swap cache stats: add 0, delete 0, find 0/0 [ 763.338718] Free swap = 0kB [ 763.338720] Total swap = 0kB [ 763.338723] 1965979 pages RAM [ 763.338725] 0 pages HighMem/MovableOnly [ 763.338727] 313627 pages reserved [ 763.961476] Mem-Info: [ 763.963911] active_anon:123493 inactive_anon:320 isolated_anon:0 [ 763.963911] active_file:28 inactive_file:33 isolated_file:0 [ 763.963911] unevictable:0 dirty:3 writeback:0 unstable:0 [ 763.963911] slab_reclaimable:7213 slab_unreclaimable:67501 [ 763.963911] mapped:52269 shmem:4337 pagetables:9257 bounce:0 [ 763.963911] free:35 free_pcp:279 free_cma:0 [ 764.071477] Node 0 active_anon:493972kB inactive_anon:1280kB active_file:112kB inactive_file:132kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:209076kB dirty:12kB writeback:0kB shmem:17348kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 764.141481] DMA32 free:0kB min:4696kB low:7712kB high:10728kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:8kB unevictable:0kB writepending:0kB present:3145324kB managed:3020092kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 764.274538] lowmem_reserve[]: 0 3505 3505 [ 764.279261] Normal free:16kB min:5580kB low:9168kB high:12756kB active_anon:493972kB inactive_anon:1280kB active_file:112kB inactive_file:124kB unevictable:0kB writepending:12kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28852kB slab_unreclaimable:270204kB kernel_stack:15488kB pagetables:37028kB bounce:0kB free_pcp:948kB local_pcp:564kB free_cma:0kB [ 764.451479] lowmem_reserve[]: 0 0 0 [ 764.455657] DMA32: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 764.516935] Normal: 98*4kB (UM) 15*8kB (UM) 1*16kB (H) 1*32kB (U) 1*64kB (U) 0*128kB 0*256kB 11*512kB (U) 34*1024kB (U) 25*2048kB (U) 0*4096kB = 92272kB 4435 total pagecache pages [ 764.655179] 0 pages in swap cache [ 764.658615] Swap cache stats: add 0, delete 0, find 0/0 [ 764.731478] Free swap = 0kB [ 764.734507] Total swap = 0kB [ 764.737509] 1965979 pages RAM [ 764.740600] 0 pages HighMem/MovableOnly [ 764.801556] 313627 pages reserved [ 764.805073] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 764.819918] [ 470] 0 470 5365 169 15 3 0 -1000 udevd [ 764.854781] [ 1747] 0 1747 2492 572 8 3 0 0 dhclient [ 764.874419] [ 1886] 0 1886 14231 163 24 3 0 0 rsyslogd [ 764.891489] [ 1941] 0 1941 4724 50 15 3 0 0 cron [ 764.912044] [ 1959] 0 1959 3735 45 12 3 0 0 mcstransd [ 764.921361] [ 1969] 0 1969 12489 152 28 3 0 -1000 sshd [ 764.941210] [ 1989] 0 1989 12926 1231 26 3 0 0 restorecond [ 764.961627] [ 2019] 0 2019 3648 41 13 3 0 0 getty [ 764.970462] [ 2027] 0 2027 17820 197 39 3 0 0 sshd [ 765.001523] [ 2029] 0 2029 154321 97199 264 5 0 0 syz-fuzzer [ 765.010817] [14764] 0 14764 18114 17 23 4 0 0 syz-executor.3 [ 765.050066] [14765] 0 14765 18113 8732 24 5 0 0 syz-executor.3 [ 765.071317] [15538] 0 15538 18146 8745 26 5 0 1000 syz-executor.3 [ 765.091816] [15795] 0 15795 18146 8745 26 5 0 1000 syz-executor.3 [ 765.101397] [16202] 0 16202 18278 8753 26 5 0 1000 syz-executor.3 [ 765.121136] [16277] 0 16277 18179 8747 26 5 0 1000 syz-executor.3 [ 765.141497] [16355] 0 16355 18179 8747 26 5 0 1000 syz-executor.3 [ 765.151054] [16423] 0 16423 18179 8747 26 5 0 1000 syz-executor.3 [ 765.181512] [16434] 0 16434 18212 8749 26 5 0 1000 syz-executor.3 [ 765.191068] [16486] 0 16486 18179 8747 26 5 0 1000 syz-executor.3 [ 765.221502] [16554] 0 16554 18212 8749 26 5 0 1000 syz-executor.3 [ 765.241509] [16618] 0 16618 18212 8749 26 5 0 1000 syz-executor.3 [ 765.251076] [16702] 0 16702 18212 8749 26 5 0 1000 syz-executor.3 [ 765.281496] [16768] 0 16768 18179 8747 26 5 0 1000 syz-executor.3 [ 765.301492] [16815] 0 16815 18179 8747 26 5 0 1000 syz-executor.3 [ 765.314680] [16862] 0 16862 18212 8749 26 5 0 1000 syz-executor.3 [ 765.341411] [16931] 0 16931 18212 8749 26 5 0 1000 syz-executor.3 [ 765.361480] [16968] 0 16968 18212 8749 26 5 0 1000 syz-executor.3 [ 765.371154] [17267] 0 17267 18179 8747 26 5 0 1000 syz-executor.3 [ 765.398101] [17300] 0 17300 18212 8749 26 5 0 1000 syz-executor.3 [ 765.408196] [17364] 0 17364 18212 8749 26 5 0 1000 syz-executor.3 [ 765.417866] [17427] 0 17427 18212 8749 26 5 0 1000 syz-executor.3 [ 765.427503] [17761] 0 17761 18179 8746 26 5 0 1000 syz-executor.3 [ 765.437650] [17849] 0 17849 18179 8746 26 5 0 1000 syz-executor.3 [ 765.447592] [18072] 0 18072 18212 8749 26 5 0 1000 syz-executor.3 [ 765.457470] [18102] 0 18102 18212 8749 26 5 0 1000 syz-executor.3 [ 765.467094] [18332] 0 18332 18212 8749 26 5 0 1000 syz-executor.3 [ 765.476888] [18389] 0 18389 18212 8749 26 5 0 1000 syz-executor.3 [ 765.486822] [18492] 0 18492 18212 8749 26 5 0 1000 syz-executor.3 [ 765.496398] [18718] 0 18718 18212 8749 26 5 0 1000 syz-executor.3 [ 765.506667] [18811] 0 18811 18212 8749 26 5 0 1000 syz-executor.3 [ 765.516238] [18868] 0 18868 18212 8749 26 5 0 1000 syz-executor.3 [ 765.535984] [19100] 0 19100 18212 8749 26 5 0 1000 syz-executor.3 [ 765.545726] [19230] 0 19230 18212 8749 26 5 0 1000 syz-executor.3 [ 765.570690] [19304] 0 19304 18212 8749 26 5 0 1000 syz-executor.3 [ 765.591505] [19366] 0 19366 18212 8749 26 5 0 1000 syz-executor.3 [ 765.601075] [19417] 0 19417 18212 8749 26 5 0 1000 syz-executor.3 [ 765.631541] [19622] 0 19622 18212 8749 26 5 0 1000 syz-executor.3 [ 765.641123] [19681] 0 19681 18212 8749 26 5 0 1000 syz-executor.3 [ 765.671501] [19728] 0 19728 18212 8749 26 5 0 1000 syz-executor.3 [ 765.681088] [19957] 0 19957 18212 8749 26 5 0 1000 syz-executor.3 [ 765.701500] [20018] 0 20018 18179 8747 26 5 0 1000 syz-executor.3 [ 765.721498] [20079] 0 20079 18212 8749 26 5 0 1000 syz-executor.3 [ 765.731071] [20139] 0 20139 18146 8745 26 5 0 1000 syz-executor.3 [ 765.748387] [20147] 0 20147 18114 17 23 3 0 0 syz-executor.5 [ 765.758256] [20148] 0 20148 18113 8734 24 4 0 0 syz-executor.5 [ 765.767848] [20318] 0 20318 18179 8747 26 5 0 1000 syz-executor.3 [ 765.777414] [20352] 0 20352 18212 8749 26 5 0 1000 syz-executor.3 [ 765.786998] [20562] 0 20562 18212 8749 26 5 0 1000 syz-executor.3 [ 765.796557] [20625] 0 20625 18212 8749 26 5 0 1000 syz-executor.3 [ 765.806146] [20684] 0 20684 18179 8747 26 5 0 1000 syz-executor.3 [ 765.815698] [20702] 0 20702 18179 8747 26 5 0 1000 syz-executor.3 [ 765.825271] [20725] 0 20725 18179 8747 26 5 0 1000 syz-executor.3 [ 765.834831] [20930] 0 20930 18212 8749 26 5 0 1000 syz-executor.3 [ 765.844401] [21019] 0 21019 18212 8749 26 5 0 1000 syz-executor.3 [ 765.853952] [21090] 0 21090 18212 8749 26 5 0 1000 syz-executor.3 [ 765.863528] [21177] 0 21177 18179 8747 26 5 0 1000 syz-executor.3 [ 765.873079] [21238] 0 21238 18179 8747 26 5 0 1000 syz-executor.3 [ 765.882951] [21367] 0 21367 18179 8747 26 5 0 1000 syz-executor.3 [ 765.893476] [21443] 0 21443 18212 8749 26 5 0 1000 syz-executor.3 [ 765.903679] [21508] 0 21508 18179 8747 26 5 0 1000 syz-executor.3 [ 765.913352] [21702] 0 21702 18212 8749 26 5 0 1000 syz-executor.3 [ 765.922965] [21758] 0 21758 18212 8749 26 5 0 1000 syz-executor.3 [ 765.932523] [21796] 0 21796 18212 8749 26 5 0 1000 syz-executor.3 [ 765.942092] [21891] 0 21891 18179 8747 26 5 0 1000 syz-executor.3 [ 765.951662] [21993] 0 21993 18212 8749 26 5 0 1000 syz-executor.3 [ 765.961218] [22201] 0 22201 18278 8753 26 5 0 1000 syz-executor.3 [ 765.970796] [22280] 0 22280 18212 8749 26 5 0 1000 syz-executor.3 [ 765.980350] [22354] 0 22354 18212 8749 26 5 0 1000 syz-executor.3 [ 765.989931] [22425] 0 22425 18179 8747 26 5 0 1000 syz-executor.3 [ 765.999587] [22485] 0 22485 18179 8747 26 5 0 1000 syz-executor.3 [ 766.009154] [22501] 0 22501 18212 8749 26 5 0 1000 syz-executor.3 [ 766.018985] [22572] 0 22572 18212 8749 26 5 0 1000 syz-executor.3 [ 766.028561] [22778] 0 22778 18212 8749 26 5 0 1000 syz-executor.3 [ 766.038128] [23013] 0 23013 18212 8749 26 5 0 1000 syz-executor.3 [ 766.047711] [23101] 0 23101 18179 8747 26 5 0 1000 syz-executor.3 [ 766.057288] [23211] 0 23211 18212 8749 26 5 0 1000 syz-executor.3 [ 766.066883] [23305] 0 23305 18212 8749 26 5 0 1000 syz-executor.3 [ 766.076440] [23521] 0 23521 18245 8751 26 5 0 1000 syz-executor.3 [ 766.086009] [23580] 0 23580 18212 8749 26 5 0 1000 syz-executor.3 [ 766.095575] [23641] 0 23641 18212 8749 26 5 0 1000 syz-executor.3 [ 766.105164] [23692] 0 23692 18212 8749 26 5 0 1000 syz-executor.3 [ 766.114731] [23757] 0 23757 18212 8749 26 5 0 1000 syz-executor.3 [ 766.124325] [23812] 0 23812 18212 8749 26 5 0 1000 syz-executor.3 [ 766.133879] [23895] 0 23895 18212 8749 26 5 0 1000 syz-executor.3 [ 766.143729] [23923] 0 23923 18179 8747 26 5 0 1000 syz-executor.3 [ 766.153285] [23991] 0 23991 18179 8747 26 5 0 1000 syz-executor.3 [ 766.162856] [24067] 0 24067 18212 8749 26 5 0 1000 syz-executor.3 [ 766.172435] [24138] 0 24138 18179 8747 26 5 0 1000 syz-executor.3 [ 766.182011] [24205] 0 24205 18212 8749 26 5 0 1000 syz-executor.3 [ 766.191578] [24263] 0 24263 18212 8749 26 5 0 1000 syz-executor.3 [ 766.201205] [24327] 0 24327 18146 8745 26 5 0 1000 syz-executor.3 [ 766.210824] [24358] 0 24358 18179 8747 26 5 0 1000 syz-executor.3 [ 766.220394] [24402] 0 24402 18179 8747 26 5 0 1000 syz-executor.3 [ 766.229990] [24421] 0 24421 18179 8747 26 5 0 1000 syz-executor.3 [ 766.239547] [24457] 0 24457 18179 8747 26 5 0 1000 syz-executor.3 [ 766.249116] [24491] 0 24491 18212 8749 26 5 0 1000 syz-executor.3 [ 766.258688] [24550] 0 24550 18212 8749 26 5 0 1000 syz-executor.3 [ 766.268272] [24601] 0 24601 18212 8749 26 5 0 1000 syz-executor.3 [ 766.278109] [24672] 0 24672 18212 8749 26 5 0 1000 syz-executor.3 [ 766.287683] [24869] 0 24869 18179 8747 26 5 0 1000 syz-executor.3 [ 766.297255] [24886] 0 24886 18212 8749 26 5 0 1000 syz-executor.3 [ 766.306827] [24934] 0 24934 18212 8749 26 5 0 1000 syz-executor.3 [ 766.316404] [24966] 0 24966 18212 8749 26 5 0 1000 syz-executor.3 [ 766.325990] [25031] 0 25031 18212 8749 26 5 0 1000 syz-executor.3 [ 766.335557] [25106] 0 25106 18212 8749 26 5 0 1000 syz-executor.3 [ 766.345126] [25333] 0 25333 18179 8747 26 5 0 1000 syz-executor.3 [ 766.354685] [25394] 0 25394 18212 8749 26 5 0 1000 syz-executor.3 [ 766.364305] [25476] 0 25476 18212 8749 26 5 0 1000 syz-executor.3 [ 766.373867] [25491] 0 25491 18179 8747 26 5 0 1000 syz-executor.3 [ 766.383465] [25534] 0 25534 18212 8748 26 5 0 1000 syz-executor.3 [ 766.393028] [25765] 0 25765 18212 8748 26 5 0 1000 syz-executor.3 [ 766.402885] [25848] 0 25848 18179 8747 26 5 0 1000 syz-executor.3 [ 766.412441] [25924] 0 25924 18179 8747 26 5 0 1000 syz-executor.3 [ 766.422005] [25987] 0 25987 18212 8749 26 5 0 1000 syz-executor.3 [ 766.431574] [26054] 0 26054 18179 8747 26 5 0 1000 syz-executor.3 [ 766.441107] [26127] 0 26127 18212 8749 26 5 0 1000 syz-executor.3 [ 766.450693] [26211] 0 26211 18179 8747 26 5 0 1000 syz-executor.3 [ 766.460250] [26259] 0 26259 18179 8750 26 4 0 0 syz-executor.5 [ 766.469816] [26265] 0 26265 18212 8749 26 5 0 1000 syz-executor.3 [ 766.479391] [26283] 0 26283 18179 8750 26 4 0 0 syz-executor.5 [ 766.488966] [26345] 0 26345 18212 8749 26 5 0 1000 syz-executor.3 [ 766.498524] [26386] 0 26386 18212 8749 26 5 0 1000 syz-executor.3 [ 766.508115] [26425] 0 26425 18212 8749 26 5 0 1000 syz-executor.3 [ 766.517679] [26491] 0 26491 18212 8749 26 5 0 1000 syz-executor.3 [ 766.527284] [26529] 0 26529 18179 8747 26 5 0 1000 syz-executor.3 [ 766.537125] [26551] 0 26551 18179 8751 27 4 0 0 syz-executor.5 [ 766.546697] [26791] 0 26791 18212 8749 26 5 0 1000 syz-executor.3 [ 766.556254] [26976] 0 26976 18212 8749 26 5 0 1000 syz-executor.3 [ 766.565845] [27031] 0 27031 18212 8749 26 5 0 1000 syz-executor.3 [ 766.575401] [27110] 0 27110 18179 8747 26 5 0 1000 syz-executor.3 [ 766.584967] [27177] 0 27177 18212 8749 26 5 0 1000 syz-executor.3 [ 766.594526] [27254] 0 27254 18212 8749 26 5 0 1000 syz-executor.3 [ 766.604094] [27321] 0 27321 18212 8749 26 5 0 1000 syz-executor.3 [ 766.613644] [27375] 0 27375 18179 8715 25 4 0 1000 syz-executor.3 [ 766.623424] [27430] 0 27430 18179 8715 25 4 0 1000 syz-executor.3 [ 766.632979] [27472] 0 27472 18179 8715 25 4 0 1000 syz-executor.3 [ 766.642822] [27509] 0 27509 18212 8749 26 5 0 1000 syz-executor.3 [ 766.652380] [27555] 0 27555 18212 8749 26 5 0 1000 syz-executor.3 [ 766.663373] [27710] 0 27710 18212 8749 26 5 0 1000 syz-executor.3 [ 766.672927] [27758] 0 27758 18179 8747 26 5 0 1000 syz-executor.3 [ 766.682782] [27993] 0 27993 18212 8749 26 5 0 1000 syz-executor.3 [ 766.692342] [28056] 0 28056 18212 8749 26 5 0 1000 syz-executor.3 [ 766.702202] [28094] 0 28094 18179 8747 26 5 0 1000 syz-executor.3 [ 766.711855] [28319] 0 28319 18212 8749 26 5 0 1000 syz-executor.3 [ 766.721704] [28397] 0 28397 18212 8749 26 5 0 1000 syz-executor.3 [ 766.731245] [28484] 0 28484 18212 8749 26 5 0 1000 syz-executor.3 [ 766.741027] [28557] 0 28557 18212 8749 26 5 0 1000 syz-executor.3 [ 766.750590] [28647] 0 28647 18212 8749 26 5 0 1000 syz-executor.3 [ 766.760414] [28701] 0 28701 18212 8749 26 5 0 1000 syz-executor.3 [ 766.769968] [28744] 0 28744 18212 8749 26 5 0 1000 syz-executor.3 [ 766.779772] [28803] 0 28803 18179 8747 26 5 0 1000 syz-executor.3 [ 766.789335] [28888] 0 28888 18212 8749 26 5 0 1000 syz-executor.3 [ 766.799469] [28897] 0 28897 18212 8749 26 4 0 0 syz-executor.5 [ 766.809038] [28925] 0 28925 18212 8749 26 5 0 1000 syz-executor.3 [ 766.818813] [29149] 0 29149 18212 8749 26 5 0 1000 syz-executor.3 [ 766.828370] [29227] 0 29227 18212 8749 26 5 0 1000 syz-executor.3 [ 766.838149] [29307] 0 29307 18212 8749 26 5 0 1000 syz-executor.3 [ 766.847708] [29327] 0 29327 18212 9038 25 3 0 0 syz-executor.5 [ 766.857545] [29370] 0 29370 18278 12817 33 3 0 0 syz-executor.5 [ 766.867107] [29381] 0 29381 18212 8749 26 5 0 1000 syz-executor.3 [ 766.876880] [29383] 0 29383 18212 8751 26 4 0 0 syz-executor.5 [ 766.886433] [29416] 0 29416 18212 8749 26 5 0 1000 syz-executor.3 [ 766.896197] [29445] 0 29445 18245 9535 28 4 0 0 syz-executor.5 [ 766.905757] [29557] 0 29557 18179 8747 26 5 0 1000 syz-executor.3 [ 766.915568] [29628] 0 29628 18212 8749 26 5 0 1000 syz-executor.3 [ 766.925405] [29832] 0 29832 18212 8749 26 5 0 1000 syz-executor.3 [ 766.935173] [29856] 0 29856 18278 11180 31 4 0 0 syz-executor.5 [ 766.944726] [29908] 0 29908 18179 8747 26 5 0 1000 syz-executor.3 [ 766.954496] [29950] 0 29950 18179 8717 28 3 0 0 syz-executor.5 [ 766.964078] [29974] 0 29974 18212 8749 26 5 0 1000 syz-executor.3 [ 766.973837] [30019] 0 30019 18212 8749 26 5 0 1000 syz-executor.3 [ 766.983394] [30062] 0 30062 18212 8749 26 5 0 1000 syz-executor.3 [ 766.993158] [30276] 0 30276 18212 8749 26 5 0 1000 syz-executor.3 [ 767.002714] [30338] 0 30338 18146 8747 26 4 0 0 syz-executor.5 [ 767.012480] [30346] 0 30346 18212 8749 26 5 0 1000 syz-executor.3 [ 767.022034] [30385] 0 30385 18212 8749 26 5 0 1000 syz-executor.3 [ 767.031858] [30465] 0 30465 18146 8714 25 3 0 0 syz-executor.5 [ 767.041616] [30486] 0 30486 18212 8749 26 5 0 1000 syz-executor.3 [ 767.051153] [30497] 0 30497 18212 8721 26 3 0 0 syz-executor.5 [ 767.061224] [30634] 0 30634 18179 8747 26 5 0 1000 syz-executor.3 [ 767.070791] [30745] 0 30745 18212 8749 26 5 0 1000 syz-executor.3 [ 767.080594] [30796] 0 30796 18212 8749 26 5 0 1000 syz-executor.3 [ 767.090155] [30830] 0 30830 18212 8749 26 5 0 1000 syz-executor.3 [ 767.099926] [30853] 0 30853 18212 8749 26 5 0 1000 syz-executor.3 [ 767.109496] [31064] 0 31064 18212 8749 26 5 0 1000 syz-executor.3 [ 767.119358] [31094] 0 31094 18212 8749 26 5 0 1000 syz-executor.3 [ 767.128923] [31322] 0 31322 18212 8749 26 5 0 1000 syz-executor.3 [ 767.138839] [31413] 0 31413 18212 8749 26 5 0 1000 syz-executor.3 [ 767.148408] [31469] 0 31469 18212 8749 26 5 0 1000 syz-executor.3 [ 767.158227] [31540] 0 31540 18212 8749 26 5 0 1000 syz-executor.3 [ 767.167920] [31614] 0 31614 18245 8751 26 5 0 1000 syz-executor.3 [ 767.177742] [31663] 0 31663 18212 8749 26 5 0 1000 syz-executor.3 [ 767.187645] [31724] 0 31724 18212 8749 26 5 0 1000 syz-executor.3 [ 767.197457] [31827] 0 31827 18212 8749 26 5 0 1000 syz-executor.3 [ 767.207146] [31896] 0 31896 18212 8749 26 5 0 1000 syz-executor.3 [ 767.216931] [31999] 0 31999 18212 8749 26 5 0 1000 syz-executor.3 [ 767.226478] [32081] 0 32081 18179 8747 26 5 0 1000 syz-executor.3 [ 767.236233] [32145] 0 32145 18212 8749 26 5 0 1000 syz-executor.3 [ 767.245776] [32196] 0 32196 18212 8749 26 5 0 1000 syz-executor.3 [ 767.255525] [32404] 0 32404 18212 8749 26 5 0 1000 syz-executor.3 [ 767.265070] [32478] 0 32478 18212 8749 26 5 0 1000 syz-executor.3 [ 767.275100] [32525] 0 32525 18212 8749 26 5 0 1000 syz-executor.3 [ 767.284650] [32584] 0 32584 18179 8747 26 5 0 1000 syz-executor.3 [ 767.294406] [32617] 0 32617 18212 8749 26 5 0 1000 syz-executor.3 [ 767.303956] [32691] 0 32691 18212 8749 26 5 0 1000 syz-executor.3 [ 767.314103] [32760] 0 32760 18212 8749 26 5 0 1000 syz-executor.3 [ 767.323682] [ 390] 0 390 18212 8749 26 5 0 1000 syz-executor.3 [ 767.333450] [ 434] 0 434 18212 8749 26 5 0 1000 syz-executor.3 [ 767.343002] [ 466] 0 466 18212 8749 26 5 0 1000 syz-executor.3 [ 767.352789] [ 504] 0 504 18212 8749 26 5 0 1000 syz-executor.3 [ 767.362358] [ 533] 0 533 18212 8749 26 5 0 1000 syz-executor.3 [ 767.372121] [ 563] 0 563 18114 16 23 3 0 0 syz-executor.4 [ 767.381674] [ 565] 0 565 18113 8731 24 4 0 0 syz-executor.4 [ 767.391200] [ 740] 0 740 18212 8749 26 5 0 1000 syz-executor.3 [ 767.401002] [ 814] 0 814 18212 8749 26 5 0 1000 syz-executor.3 [ 767.410553] [ 882] 0 882 18212 8749 26 5 0 1000 syz-executor.3 [ 767.420405] [ 1029] 0 1029 18212 8749 26 5 0 1000 syz-executor.3 [ 767.429974] [ 1068] 0 1068 18212 8749 26 5 0 1000 syz-executor.3 [ 767.439738] [ 1134] 0 1134 18212 8749 26 5 0 1000 syz-executor.3 [ 767.449637] [ 1215] 0 1215 18212 8749 26 5 0 1000 syz-executor.3 [ 767.459390] [ 1283] 0 1283 18212 8749 26 5 0 1000 syz-executor.3 [ 767.468949] [ 1336] 0 1336 18212 8749 26 5 0 1000 syz-executor.3 [ 767.478764] [ 1526] 0 1526 18212 8749 26 5 0 1000 syz-executor.3 [ 767.488313] [ 1633] 0 1633 18212 8749 26 5 0 1000 syz-executor.3 [ 767.498070] [ 1702] 0 1702 18212 8749 26 5 0 1000 syz-executor.3 [ 767.507625] [ 1758] 0 1758 18212 8749 26 5 0 1000 syz-executor.3 [ 767.517389] [ 1907] 0 1907 18212 8749 26 5 0 1000 syz-executor.3 [ 767.526936] [ 1997] 0 1997 18212 8749 26 5 0 1000 syz-executor.3 [ 767.536676] [ 2076] 0 2076 18212 8749 26 5 0 1000 syz-executor.3 [ 767.546219] [ 2142] 0 2142 18212 8749 26 5 0 1000 syz-executor.3 [ 767.556134] [ 2443] 0 2443 18212 8749 26 5 0 1000 syz-executor.3 [ 767.565679] [ 2676] 0 2676 18212 8749 26 5 0 1000 syz-executor.3 [ 767.575715] [ 2721] 0 2721 18212 8749 26 5 0 1000 syz-executor.3 [ 767.585291] [ 2793] 0 2793 18212 8749 26 5 0 1000 syz-executor.3 [ 767.595091] [ 2829] 0 2829 18212 8749 26 5 0 1000 syz-executor.3 [ 767.604637] [ 2885] 0 2885 18179 8747 26 5 0 1000 syz-executor.3 [ 767.614388] [ 2922] 0 2922 18114 16 23 3 0 0 syz-executor.0 [ 767.623951] [ 2923] 0 2923 18113 8579 24 4 0 0 syz-executor.0 [ 767.633790] [ 3077] 0 3077 18147 8740 26 4 0 1000 syz-executor.0 [ 767.643336] [ 3098] 0 3098 18212 8749 26 5 0 1000 syz-executor.3 [ 767.653090] [ 3158] 0 3158 18212 8749 26 5 0 1000 syz-executor.3 [ 767.662640] [ 3238] 0 3238 18212 8749 26 5 0 1000 syz-executor.3 [ 767.672379] [ 3259] 0 3259 18212 8749 26 5 0 1000 syz-executor.3 [ 767.681940] [ 3305] 0 3305 18114 16 23 3 0 0 syz-executor.2 [ 767.691737] [ 3306] 0 3306 18113 8731 25 4 0 0 syz-executor.2 [ 767.701271] [ 3475] 0 3475 5364 542 14 3 0 -1000 udevd [ 767.710630] [ 3476] 0 3476 5364 171 14 3 0 -1000 udevd [ 767.719439] [ 3482] 0 3482 18212 8749 26 5 0 1000 syz-executor.3 [ 767.729192] [ 3553] 0 3553 18212 8749 26 5 0 1000 syz-executor.3 [ 767.738779] [ 3730] 0 3730 18245 8751 26 5 0 1000 syz-executor.3 [ 767.748540] [ 3818] 0 3818 18278 8753 26 5 0 1000 syz-executor.3 [ 767.758095] [ 3858] 0 3858 18278 8753 26 5 0 1000 syz-executor.3 [ 767.767901] [ 3882] 0 3882 18179 8746 26 4 0 0 syz-executor.4 [ 767.777456] [ 3903] 0 3903 18278 8753 26 5 0 1000 syz-executor.3 [ 767.787210] [ 3931] 0 3931 18114 15 23 3 0 0 syz-executor.1 [ 767.796787] [ 3934] 0 3934 18113 8730 24 4 0 0 syz-executor.1 [ 767.806560] [ 4127] 0 4127 18278 8753 26 5 0 1000 syz-executor.3 [ 767.816123] [ 4199] 0 4199 18179 8712 24 3 0 1000 syz-executor.0 [ 767.825877] [ 4197] 0 4197 18278 8754 27 5 0 1000 syz-executor.3 [ 767.835741] [ 4211] 0 4211 18212 8714 24 3 0 1000 syz-executor.0 [ 767.845489] [ 4222] 0 4222 18179 8723 26 3 0 1000 syz-executor.0 [ 767.855065] [ 4241] 0 4241 18278 8754 27 5 0 1000 syz-executor.3 [ 767.871667] [ 4268] 0 4268 18311 8736 26 3 0 1000 syz-executor.0 [ 767.881228] [ 4296] 0 4296 18278 8753 26 5 0 1000 syz-executor.3 [ 767.891051] [ 4312] 0 4312 18212 8748 26 4 0 1000 syz-executor.1 [ 767.900608] [ 4341] 0 4341 18278 8753 26 5 0 1000 syz-executor.3 [ 767.910364] [ 4355] 0 4355 18146 8742 26 4 0 1000 syz-executor.1 [ 767.919916] [ 4372] 0 4372 18278 8753 26 5 0 1000 syz-executor.3 [ 767.929656] [ 4428] 0 4428 18278 8753 26 5 0 1000 syz-executor.3 [ 767.939199] [ 4449] 0 4449 18245 8751 26 5 0 1000 syz-executor.3 [ 767.948945] [ 4514] 0 4514 18278 8753 26 5 0 1000 syz-executor.3 [ 767.958503] [ 4561] 0 4561 18278 8753 26 5 0 1000 syz-executor.3 [ 767.968631] [ 4647] 0 4647 18179 8715 26 3 0 1000 syz-executor.2 [ 767.978295] [ 4671] 0 4671 18245 8750 26 5 0 1000 syz-executor.3 [ 767.988128] [ 4714] 0 4714 18146 8727 26 3 0 1000 syz-executor.0 [ 767.997685] [ 4720] 0 4720 18196 8715 26 3 0 1000 syz-executor.0 [ 768.007466] [ 4802] 0 4802 18311 8755 26 5 0 1000 syz-executor.3 [ 768.017103] [ 4954] 0 4954 18245 8752 26 4 0 0 syz-executor.4 [ 768.026867] [ 4972] 0 4972 18278 8753 26 5 0 1000 syz-executor.3 [ 768.036437] [ 5060] 0 5060 18179 8746 26 4 0 0 syz-executor.4 [ 768.046237] [ 5111] 0 5111 18278 8753 26 5 0 1000 syz-executor.3 [ 768.055787] [ 5150] 0 5150 18146 8703 26 3 0 1000 syz-executor.2 [ 768.065550] [ 5155] 0 5155 18278 8754 26 5 0 1000 syz-executor.3 [ 768.075109] [ 5179] 0 5179 18146 8703 26 3 0 1000 syz-executor.2 [ 768.084867] [ 5240] 0 5240 18179 8745 27 4 0 1000 syz-executor.2 [ 768.094734] [ 5246] 0 5246 18179 8745 27 4 0 1000 syz-executor.2 [ 768.104489] [ 5256] 0 5256 18245 8752 26 5 0 1000 syz-executor.3 [ 768.114034] [ 5322] 0 5322 18278 8753 26 5 0 1000 syz-executor.3 [ 768.123814] [ 5351] 0 5351 18179 8712 26 3 0 1000 syz-executor.2 [ 768.133710] [ 5354] 0 5354 18179 8712 26 3 0 1000 syz-executor.2 [ 768.143463] [ 5360] 0 5360 18278 8753 26 5 0 1000 syz-executor.3 [ 768.153040] [ 5394] 0 5394 18245 8751 26 5 0 1000 syz-executor.3 [ 768.162863] [ 5501] 0 5501 18278 8753 26 5 0 1000 syz-executor.3 [ 768.172417] [ 5568] 0 5568 18278 8754 26 5 0 1000 syz-executor.3 [ 768.182165] [ 5580] 0 5580 18179 8745 27 4 0 1000 syz-executor.2 [ 768.191715] [ 5599] 0 5599 18278 8754 26 5 0 1000 syz-executor.3 [ 768.201249] [ 5720] 0 5720 18278 8753 26 5 0 1000 syz-executor.3 [ 768.211092] [ 5775] 0 5775 18245 8751 26 5 0 1000 syz-executor.3 [ 768.220648] [ 5841] 0 5841 18245 8751 26 5 0 1000 syz-executor.3 [ 768.230735] [ 5881] 0 5881 18278 8753 26 5 0 1000 syz-executor.3 [ 768.240292] [ 5991] 0 5991 18245 8751 26 5 0 1000 syz-executor.3 [ 768.250071] [ 6033] 0 6033 18245 8751 26 5 0 1000 syz-executor.3 [ 768.259623] [ 6078] 0 6078 18278 8753 26 5 0 1000 syz-executor.3 [ 768.269424] [ 6143] 0 6143 18245 8751 26 5 0 1000 syz-executor.3 [ 768.278972] [ 6242] 0 6242 18245 8751 26 5 0 1000 syz-executor.3 [ 768.288754] [ 6360] 0 6360 18245 8751 26 5 0 1000 syz-executor.3 [ 768.298311] [ 6420] 0 6420 18278 8752 26 5 0 1000 syz-executor.3 [ 768.308087] [ 6479] 0 6479 18278 8753 26 5 0 1000 syz-executor.3 [ 768.317641] [ 6525] 0 6525 18278 8754 26 5 0 1000 syz-executor.3 [ 768.327449] [ 6562] 0 6562 18245 8751 26 5 0 1000 syz-executor.3 [ 768.337012] [ 6619] 0 6619 18245 8752 26 5 0 1000 syz-executor.3 [ 768.346806] [ 6738] 0 6738 18278 8753 26 5 0 1000 syz-executor.3 [ 768.356684] [ 6798] 0 6798 18278 8754 26 5 0 1000 syz-executor.3 [ 768.366471] [ 6818] 0 6818 18278 8754 26 5 0 1000 syz-executor.3 [ 768.376036] [ 6856] 0 6856 18278 8753 26 5 0 1000 syz-executor.3 [ 768.385817] [ 6884] 0 6884 18278 8753 26 5 0 1000 syz-executor.3 [ 768.395361] [ 6934] 0 6934 18245 8751 26 5 0 1000 syz-executor.3 [ 768.405153] [ 6975] 0 6975 18245 8751 26 5 0 1000 syz-executor.3 [ 768.414710] [ 6995] 0 6995 18245 8751 26 5 0 1000 syz-executor.3 [ 768.424482] [ 7074] 0 7074 18278 8753 26 5 0 1000 syz-executor.3 [ 768.434039] [ 7186] 0 7186 18278 8753 26 5 0 1000 syz-executor.3 [ 768.443835] [ 7237] 0 7237 18212 8749 26 5 0 1000 syz-executor.3 [ 768.453555] [ 7255] 0 7255 18212 8749 26 5 0 1000 syz-executor.3 [ 768.463306] [ 7280] 0 7280 18278 8754 26 5 0 1000 syz-executor.3 [ 768.472851] [ 7313] 0 7313 18278 8754 26 5 0 1000 syz-executor.3 [ 768.482920] [ 7416] 0 7416 18179 8750 26 5 0 1000 syz-executor.3 [ 768.492471] [ 7439] 0 7439 18278 8753 26 5 0 1000 syz-executor.3 [ 768.502217] [ 7492] 0 7492 18311 8755 26 5 0 1000 syz-executor.3 [ 768.511761] [ 7537] 0 7537 18245 8752 27 5 0 1000 syz-executor.3 [ 768.521289] [ 7639] 0 7639 18245 8751 26 5 0 1000 syz-executor.3 [ 768.531065] [ 7738] 0 7738 18245 8751 26 5 0 1000 syz-executor.3